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", 0x1000, 0x81}, {&(0x7f0000000980)="b79fb9e9ab4feba22ffb95e39a9060853a62b915f0eaedc37775ddf61fd6675768a619b30e2176b77e8bd8bbc022779a59f7d5babc2fc0f39f0109936c4eca0a445eae8e5246eff2c48d9f929e91903886f9a80d3b1159c0f05001cea72625e5459cfe6bc743788ddd09fc840b7ba65021fa18cea3580fa47ca203c17f3a752fa96354c9c46635e12adccc73f71bcaad70391900e11a7e33452ba5c7b8dec059176166e2f4f3604f", 0xa8, 0x100000000}, {&(0x7f0000000240)="d87255883e3bbad7f5ffa5087cdbc112a8e4e2a026824686e9e5821dd4a27c401f3c5cc87173bd64", 0x28, 0x4}], 0x34048, &(0x7f00000003c0)=ANY=[@ANYBLOB='init_itable,subj_role=net/snmp\x00,uid=', @ANYRESDEC=r8, @ANYBLOB=',obj_role=/dev/rfkill\x00,defcontext=user_u,fsname=]posix_acl_access{vmnet0:,obj_user=/dev/rfkill\x00,audit,rootcontext=sysadm_u,uid>', @ANYRESDEC=r10, @ANYBLOB="2c66736e614d653d2f6465762f0500000064696f23002c00676a4f66fd16fa2c73acd34837bf9c21073c6942691b438f8525"]) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0x0, 0x3}, {0x6, 0x8}], r10}, 0x18, 0x1) 13:55:56 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f00000001c0)="ba", 0x1}], 0x1, 0x0) 13:55:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)={0x9, 0x0, 0x1, 0x400}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000180)={r3, 0x8}) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 328.801446] audit: type=1804 audit(1569765356.484:874): pid=13880 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/171/bus" dev="sda1" ino=16849 res=1 [ 328.846856] audit: type=1804 audit(1569765356.514:875): pid=13880 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/171/bus" dev="sda1" ino=16849 res=1 [ 328.913599] audit: type=1804 audit(1569765356.514:876): pid=13880 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/171/bus" dev="sda1" ino=16849 res=1 [ 328.940871] audit: type=1804 audit(1569765356.564:877): pid=13880 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/171/bus" dev="sda1" ino=16849 res=1 13:55:56 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:55:56 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f00000001c0)="ba", 0x1}], 0x1, 0x0) 13:55:56 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(0xffffffffffffffff, &(0x7f0000001680)=[{&(0x7f00000001c0)="ba", 0x1}], 0x1, 0x0) 13:55:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, 0x0, 0x0, 0x0) 13:55:56 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8100, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x40000000000, 0x20000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$alg(r3, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000540)="db8b76b75c3d0e30193ecea2aa", 0xd}, {&(0x7f0000000700)="80754bb7cf6d6c1616cdc7caeb2e5d9ef862f83d7ee2ea081633d51953a492392b943165ee42d077306ccc9a3ee2d85ee720950480e85fa84c440c3de5ee2be0e68b4af205f3f1ce7eae223011a7307487d0f1398d67459d1f8b6dd686c3d4f4b232e21e8e3a7e99ecacef56760b025b57693752f09a1e3532f0a69cf1c8344b768989150b0880ea381dffd5ca04739090c245c4a3e3bafcd399c2dc949ed88f7a9799a2", 0xa4}, {&(0x7f00000008c0)="7a87ff90077ab694eb1cbac3383e47335323464785324a52cfb6bcf4a2d54a5eb2edf3ce12cb8d572a445cb30e00b93aa43fa74ff86f9e725a591d6d0e4fb56927e20195347adaa5e4c967b4b73b23d190aa1b92aef4e99db17b665208d7df7356e2cad92a77cf849b29a68395d7db283dd02eb69b5d0e8e8606d3b97f8afcc1bcd72fb7a7150f126777106ad3e53817949cfa35af87a970454da4996e16a0bcecb56a894d0aa6b0cb7e7034af2703d09e509b7b182485fcff32cdf801071c8db296b832c078fd968dfd1ba7afac704133ecb6d1392e24d12ace4952117e3b770d40", 0xe2}, {&(0x7f00000009c0)="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", 0xfd}, {&(0x7f0000000580)="1c0683b94b634ed3fadde4c3514d4bdd", 0x10}, {&(0x7f00000007c0)="dd0723740951cf8d1ff1d0853a62ba020aeafad644baf9e92511480e514e793391279dba7fbb991f375f6171cd7c30dbe0dfa8d8ee053af0f62518455d61d4954bfda9d6d0f65ae3ce3259f653c832f73034adaf991366f4ecce19adea2217f61f84f9eeb99c0ccb96bb4e1d6f994bd2fe4bf6d23027824be3b0cf9a82742f45624e533e56b68b4b4ccdac1b195f4516383d74ac2701fc9823c01e3071b1d9ba2031062e5b835ff45a286cdda18ef08d", 0xb0}], 0x6, &(0x7f0000000b40)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x10}, 0x40000) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x14, r5, 0x21}, 0x14}}, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000007000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$KVM_INTERRUPT(r3, 0x4004ae86, &(0x7f0000000500)=0xff) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000400)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r6, 0x89a0, &(0x7f00000005c0)={@rand_addr="b9c348b5645c3176709c2d3e96e3c68a", @rand_addr="4892e5f324db558c0eaed7d1e9a8ac4b", @remote, 0x0, 0xff00, 0x0, 0x0, 0x2, 0x0, r8}) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x840000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r5, 0x800, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r8}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008080}, 0x4000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r13, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, r13, {0x0, 0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r17, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, r17, {0x0, 0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'vcan0\x00', r17}) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r21, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r21, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r23 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r23, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r24 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r24, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r25, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$nl_route(r20, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r22, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRESDEC=r9, @ANYRESOCT=0x0, @ANYPTR, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRESOCT=r23, @ANYRES32=r24, @ANYPTR, @ANYRES32, @ANYPTR, @ANYRESDEC=r25]]], 0x5}}, 0x0) sendmsg$nl_route_sched(r19, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, r22, {0x0, 0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000400)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f0000000440)=0xe8) r28 = socket$nl_route(0x10, 0x3, 0x0) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r31, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r28, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, r31, {0x0, 0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r32, 0x407, 0x0) write(r32, &(0x7f0000000340), 0x41395527) dup(r32) getsockopt$inet_pktinfo(r32, 0x0, 0x8, &(0x7f0000000500)={0x0, @empty, @empty}, &(0x7f0000000800)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000a80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000a40)={&(0x7f0000000840)={0x1d0, r5, 0x20, 0x70bd27, 0x25dfdbfd, {}, [{{0x8, 0x1, r9}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}]}}, {{0x8, 0x1, r13}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r22}, {0x128, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r33}}}]}}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x44c3301739759bf7}, 0x59b3a37bdd22e34a) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r1, 0x0) r34 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r35 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r34, &(0x7f0000000bc0)=ANY=[@ANYBLOB="f880ca13bf2a6cd17781995aa1c407008d5ee8ad0c5e465314b2847f90bc64028b1b378640b6dac1f5e2071645f09ab8eb9749b2511a391c3ef55351d28a08f97cbc0f503ca5ed0946722df2aad5b1f8260e5154d54da4e94e31e62d1dc1bef0e9b3"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r38 = fcntl$dupfd(r37, 0x0, r36) ioctl$PERF_EVENT_IOC_ENABLE(r38, 0x8912, 0x400200) fcntl$setstatus(r35, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r39, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r35, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:55:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x0, @broadcast, 'rose0\x00'}}, 0x1e) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0)=0x3, 0x4) 13:55:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, 0x0, 0x0, 0x0) [ 329.177982] audit: type=1400 audit(1569765356.854:878): avc: denied { getopt } for pid=13902 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 13:55:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, 0x0, 0x0, 0x0) 13:55:57 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:55:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, &(0x7f0000001680), 0x0, 0x0) 13:55:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, &(0x7f0000001680), 0x0, 0x0) 13:55:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x2288, &(0x7f0000000140)) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x182141, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000440)={{0x2, 0x0, @reserved="3951103c01f5b21a5d7e640219acab84d6498d25ec34d2a42fff5874c5e2ca4c"}}) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x410000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r5, 0x320, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x14, 0x17, {0x15, 0x10002, @l2={'ib', 0x3a, 'ifb0\x00'}}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0xc000}, 0x0) 13:55:57 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:55:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, &(0x7f0000001680), 0x0, 0x0) 13:55:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, &(0x7f0000001680)=[{0x0}], 0x1, 0x0) 13:55:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, &(0x7f0000001680)=[{0x0}], 0x1, 0x0) 13:55:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, &(0x7f0000001680)=[{0x0}], 0x1, 0x0) 13:55:57 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:55:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, &(0x7f0000001680)=[{&(0x7f00000001c0)}], 0x1, 0x0) 13:55:57 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r1, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x4) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[], 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fcntl$setstatus(r3, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r9, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r10, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) io_submit(r7, 0x0, &(0x7f0000000300)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x9, r9, &(0x7f0000000140)="47de5f2a70816f2a78b15a098dc92c8427209d0a64e2cafd16d764001d03633ec9b3500d48c237fc7f73e67c", 0x0, 0x3, 0x0, 0x7edaf386cba692ad}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x1, r10, &(0x7f00000001c0)="0552ea9f3870e394823f8e1d5e2fc15d739a3c1b9000504925c9948b64b5856599615d499ab125718dd931d994c22497f100fb547d709a0f409078a18ff70b4357887537590ceeebc8c549ed492ea7b12490b75d616f1f2973f19bd242166f73885ed0936c8c2d50f3974c79653850c28407fef771ff5791f9654f759bfbb0dec05fec6962cfe3b6d621adaa266ad10c14d77f6dca6ed87ef995ef20e5bdc2530ff745634449c91761ec2d9e2316c296d20c47bb1dee4415edb3e007a38e860cca9f0d34180ff3e99c592e8e6481c1207cb6a2b334ca2c78688279b1b86db54c5e881d367d365daf96e87bb3da5ec54416620b", 0x0, 0x7fffffff, 0x0, 0x0, r1}]) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000040)=""/30) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) [ 330.212925] audit: type=1804 audit(1569765357.894:879): pid=13965 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/173/bus" dev="sda1" ino=16817 res=1 [ 330.240146] net_ratelimit: 14 callbacks suppressed [ 330.240152] protocol 88fb is buggy, dev hsr_slave_0 [ 330.240197] protocol 88fb is buggy, dev hsr_slave_1 13:55:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:55:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, &(0x7f0000001680)=[{&(0x7f00000001c0)}], 0x1, 0x0) [ 330.310192] protocol 88fb is buggy, dev hsr_slave_0 [ 330.315331] protocol 88fb is buggy, dev hsr_slave_1 13:55:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr/fscreate\x00') pwritev(r0, &(0x7f0000001680)=[{&(0x7f00000001c0)}], 0x1, 0x0) 13:55:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000080)={0x4, 0xb4}) [ 330.470135] protocol 88fb is buggy, dev hsr_slave_0 [ 330.475271] protocol 88fb is buggy, dev hsr_slave_1 [ 330.558405] kvm_hv_get_msr: 250 callbacks suppressed [ 330.558414] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 [ 330.577905] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 [ 330.588210] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000a [ 330.601103] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000c [ 330.609704] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000e [ 330.623222] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000012 [ 330.633163] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000014 [ 330.644661] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000016 [ 330.654598] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000018 [ 330.666200] kvm [13979]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000001a [ 330.676425] kvm [13979]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x16adea 13:55:58 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:55:58 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000000)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x5c}]}) 13:55:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:55:58 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000240)='security.selinux\x00', &(0x7f00000002c0)='unconfined_u:system_r:insmod_t:s0-s0:c0,c1023\x00', 0x2e, 0x0) read$eventfd(r0, 0x0, 0x0) [ 330.753666] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 13:55:58 executing program 0: epoll_create1(0x0) socket$inet(0x2, 0xe, 0x7) accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @initdev}, 0x0, 0x80800) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000280)=0x1f) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x84) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x399) pipe(0x0) getegid() syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f0000000480)='./bus\x00') write(r2, &(0x7f00000001c0), 0xffffffe0) read(r1, &(0x7f0000000380)=""/250, 0xd83781586c4649d2) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) socket$netlink(0x10, 0x3, 0xa) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x200005) sendfile(r3, r4, 0x0, 0x8000ffffffff) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, 0x1c) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x4, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNATTACHFILTER(r1, 0x400854d5, &(0x7f00000002c0)={0x3, &(0x7f0000000000)=[{0xfff8, 0xe4, 0xc1, 0xc0e}, {0xa44, 0x40, 0x40, 0x9}, {0x800, 0x4, 0x0, 0x9e93}]}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_{s\x00', 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syncfs(0xffffffffffffffff) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:55:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={r0}) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8800080c}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x621, 0x70bd2b, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20046041}, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:55:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000008c0)=0xe8) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r5) setsockopt$inet_tcp_int(r5, 0x6, 0x0, &(0x7f0000000240), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000200)='./file1\x00', 0xffffffffffffff08, 0x5, &(0x7f0000000740)=[{&(0x7f0000000800)="7f9dd09318bb27dc3b624fe8b8c10cdfc3bf6c69a28bcde9f16a26d6258ac8caa0bbc17d216d29f96cfdb599aa3b32dff7ce96f08f2e6edddf38a3903c0e3d32ba171fa8bdc59ec909194a4ac5b9f8b78ae99b4fea5c0dde9799f8515d9294bfb420f556e863147732b390ed89dbda94d30e08a72bac51d165fe116e11897f65dfe7547e23102d67145e79f893e1c7196f899a06e6703203e696443bdc6a69bd18", 0xa1, 0x6}, {&(0x7f00000008c0)="49c307edf94cded61e37c66fa6b57a7afeec8e5cf96e1a2b9d0d5eec8e9b0b1865b3e37bb4971218d0fd3cbcba8e86b6f216af6d38b98eb34a1e94d99641ee78973f7a0f983f771d66906a95633f1517fe9864bfcfe2a2b4f352625f07137f64f0f45ce467c15644d564e0e64a0ab67545ef4a0327f0c5bd30bd92cae3896ebc02838c31ac842e61ac4e34f301952ebdf3bd0ee4ed4f09f73c8e2667050f148539", 0xa1, 0x5}, {&(0x7f0000001340)="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", 0x1000, 0x81}, {&(0x7f0000000980)="b79fb9e9ab4feba22ffb95e39a9060853a62b915f0eaedc37775ddf61fd6675768a619b30e2176b77e8bd8bbc022779a59f7d5babc2fc0f39f0109936c4eca0a445eae8e5246eff2c48d9f929e91903886f9a80d3b1159c0f05001cea72625e5459cfe6bc743788ddd09fc840b7ba65021fa18cea3580fa47ca203c17f3a752fa96354c9c46635e12adccc73f71bcaad70391900e11a7e33452ba5c7b8dec059176166e2f4f3604f", 0xa8, 0x100000000}, {&(0x7f0000000240)="d87255883e3bbad7f5ffa5087cdbc112a8e4e2a026824686e9e5821dd4a27c401f3c5cc87173bd64", 0x28, 0x4}], 0x34048, &(0x7f0000000b40)={[{@init_itable='init_itable'}], [{@subj_role={'subj_role', 0x3d, 'net/snmp\x00'}}, {@uid_eq={'uid', 0x3d, r4}}, {@obj_role={'obj_role', 0x3d, '/dev/rfkill\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, ']posix_acl_access{vmnet0:'}}, {@obj_user={'obj_user', 0x3d, '/dev/rfkill\x00'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r6}}, {@fsname={'fsname', 0x3d, '/dev/swradio#\x00'}}]}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000000, 0x7, &(0x7f0000000700)=[{&(0x7f0000000180)="a2ebfb51ea38c63ba8a43a989baa5f32f14f7b0d", 0x14, 0x1}, {&(0x7f00000001c0), 0x0, 0x8}, {&(0x7f0000000380)="a886a3b1a90898b6d7aab1ab1779b27ebbe761eadd9f96b02496fbb1896ff37167e384eb8188ad81fd51bf775e4b6d1897114a800904963fc8734dc9679dc80ea9ce6785be0b3ad7777cee5bfd3558f06b28cf5f3763842d4b8003b17382f150be2fc291a3e71114e4be1b51f0cdfa4a00a5627755fd88d9b9a7f84bc74cecc42beca7ec198587919590c899ae3d5375b7aee54223a965184a45273fa9e9c93a4dca9fed22be59fef787ca70841183d7e75c075a47039eac2aa5e656f1ea7e65eabd15900cf5160838570314", 0xcc, 0xc19c}, {&(0x7f0000000480)="a6d2e66a1e7219274d8f346c2514f62e7796020eace67b2ca5b82e01042fea55fa965ffaaf4ffaa76f0efd21ee6d32d440bc88c5e48254b5aa22ab2040fbd645a55b0ea4c354747c954c677918bd3e3665d28e09d3a8d1b63a0aa552647aa5765183f2a41e6b9e0a2ce942aabd8f958ca6ed106c8610f85689a1105433", 0x7d, 0x8}, {&(0x7f0000000500)="457f9d420ea9cc7b4ce2e223cc8a0a642e9ac9bafb6fee09aaf35346e2eb702e68d91f10dad5111ba96a234258dc40d0c7946f30a2a3f69248a2fbb37921344f7728a91d1906042b1bfd78dfb57f6dce6dbb10a713f4eb1a88a24e7cc07b96637d1dc7ed99a14b459857e52e45e57bb62358e79c99c3692217a9b9a09adf81e52900c10d5acf7dbd8aab6538ca695df7142b8114c1a935401ce98d756635a5ae70f000abb7953fb50eb6155ba19048b35316df4ce72deb9dc438e62177dc04dfae52debf1d161aa69dc580a3e8d4cb043dc68486af14b3b8f170c8616e484791", 0xe0}, {&(0x7f0000000600)="dd199f2249b0ea1f9d03505cee8539b17add71aa2907f257e8fc01c4c5ff0f45c2fe3ca2847f6c2de4f7be321cfef60bb659eb7892486285bced9d8e3a21def3d98a32a0d44334aae78cb34738a8eb1f9225ae01620acb2a0a38655d7dd9700a7b5154ddd32bf610904cad80998841d664637e81a52a36831f42efac606542b77dbd70b463617f97e8544b1711ed3e04c29b96dfbfe7ecdec77d6f44abc7856b553c9d314a362ba71a93665337c509b5bfe033107e830f909ca1fdf5bc618c482262da438c6ced0015328173d893149d99fd1254c28546779fa53d954536a5427baaba4eee59cee0186ce8087e3c822c00290b4227", 0xf5, 0x100}, {&(0x7f0000000240)="e480d8cde79f3ff77056f4770914ef75e08df90d03", 0x15, 0x80}], 0x8000, &(0x7f0000000900)={[{@show_sys_files_no='show_sys_files=no'}, {@case_sensitive_no='case_sensitive=no'}, {@dmask={'dmask', 0x3d, 0x100000001}}, {@errors_continue='errors=continue'}, {@nls={'nls', 0x3d, 'cp866'}}, {@nls={'nls', 0x3d, 'iso8859-15'}}, {@case_sensitive_yes='case_sensitive=yes'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/kvm\x00'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@permit_directio='permit_directio'}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/kvm\x00'}}, {@uid_lt={'uid<', r4}}]}) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r7, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 331.018065] kvm [14010]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x3b9ae [ 331.029786] kvm [14010]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 331.050796] kvm [14010]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x4000002a data 0x89173791 13:55:58 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000040)={0x4, 0x80000000, 0x6e24, 0x8001}, 0x10) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="fce132f18bd5e78f29d40b823d9aaf9cd251b2b8b45b88d4c2f842846ab4a74e5b55b05729fb53ccefbab600647e97480cd512806b21370d38d5388125c056553846ff048209fa20976b7b9c2ff1331facb70e8693ce7c80e7a57956e6d5582984f054fabdd297b83983528ede14"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) dup(r7) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r10) setsockopt$inet_tcp_int(r10, 0x6, 0x0, &(0x7f0000000240), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000200)='./file1\x00', 0xffffffffffffff08, 0x5, &(0x7f0000000740)=[{&(0x7f0000000800)="7f9dd09318bb27dc3b624fe8b8c10cdfc3bf6c69a28bcde9f16a26d6258ac8caa0bbc17d216d29f96cfdb599aa3b32dff7ce96f08f2e6edddf38a3903c0e3d32ba171fa8bdc59ec909194a4ac5b9f8b78ae99b4fea5c0dde9799f8515d9294bfb420f556e863147732b390ed89dbda94d30e08a72bac51d165fe116e11897f65dfe7547e23102d67145e79f893e1c7196f899a06e6703203e696443bdc6a69bd18", 0xa1, 0x6}, {&(0x7f00000008c0)="49c307edf94cded61e37c66fa6b57a7afeec8e5cf96e1a2b9d0d5eec8e9b0b1865b3e37bb4971218d0fd3cbcba8e86b6f216af6d38b98eb34a1e94d99641ee78973f7a0f983f771d66906a95633f1517fe9864bfcfe2a2b4f352625f07137f64f0f45ce467c15644d564e0e64a0ab67545ef4a0327f0c5bd30bd92cae3896ebc02838c31ac842e61ac4e34f301952ebdf3bd0ee4ed4f09f73c8e2667050f148539", 0xa1, 0x5}, {&(0x7f0000001340)="2dbdea8c4308e045f54fcbdf1302584e103ccfea4a94609cf0066bfb600ddc91ace8d95805f90016b1da45d49ec0275a49c91bb2eb12f1098b92a83add46e51cb47a8e5eac474c13b501bd17623e88518f56455bb7ee5d6d9298bb49f16403cbf9961dc6d4a11240f8a32e08683ad05c4fb9f47c28482a24da89cafbc943f694e76b24f29f8b381a68da6bba79f89c4b4e41ebb84d8f8aa761fb58c0a2dd54aa4bfd30f64ee7a81defc6edcd5732007a52a8e8a877dc214552f14a35c86f6cedf813dd95ef7e26e257be9425399b4aa091663fc40cbdb5808cd08fb866490446e448b8cf75a5f416e750f8c603b699d6a61842a4bc16c8582b2b37e513716d40997ed203b93f1ec3a472afc9255c796c02c0d5a6b41f434395dd078debf3c618bb79df5ab83385cbc2c62cf5c42aae9852290a4781ff65fecc4b8581077db7f6f13a594920c9f229ac1ccfb7770f00fc3c5c3753fd7551665d00c7761019c871eddf40a1699586f665e3f54ddeb01924c14f7f81da4bd4c6d1e52c0ae3fc0ddf65f7e4a0cefaae2936489a537b2f23dee9668f341f06a09693616d4d82926726e655285ceb507620eb9dd8c32a60f69b64750a3ba4f1316c24dcc03aab2e503741c24e9d23f2da0dd4aeebb84ff30d794ce5a279a108e3dac6d3732b37526c48dc4e20cd4ac2b0cc2ffa084947199322dabedff9beed3c3491f7e9373d201c29403c7c81bad31560bcebfa1a87c864bfa2f886e5821d30131f88da71206931de4de80bdf5d2a65328d9905f753a92383ab865d68c975360858f373b02426d7fccc462ba0763ff3220cb039d48bffba461c5840685ea603a0b2dcad8ab046412db927e97a5bddbb46b629dfdb796968d9aebcca8b36c93176fdd0df555bbb42c50d9ba8847adb6286a117b9cbcb0a5657a881a9d0b2c0033abbde827899604cd75877c43b7c6c1a56985079cf8b0ae4f77c2bb1df4a48be08b8a7e7ca282e2bef32813bdfddb732290f52e528747c8ba0f1353f76e64d17b4979eaab5fc4687f4e571d74104d9224cb4318dec24d49eba89c8076e5dd46911c788bbab279cc3df200ab42de0660a2bfa7fc441693e9a6ed128e4f45edc1868520720c389f4b65cd2808d7563a9ff88d1b4ae140c6a0ac3458cac179d12aaf1031d516b4157ef08cc6355d20ebd8b1e5950b97667bdfc7d150febe7b63f981f4e44954d45f83f53c5ee5bf9a87d6aa71262a5d2e629b343ee8fcd9e9a9f205024bdb7cbce408123528e1783bfbc95f43d29c6a380095394ee17e22a84e0d92ed12698c1488300479101cbca99a4e9af568b95fa88995d89348fcbc1b1cdd2775660c789e8547cd1d7bdcd1a75d03e24ecaef4c57a4152ed3fb103152bb27e030e3c5dc824825bf198d6d50d7095764dfd31f125e51f24715a74a6f648a46fb5ad217f107f8cfa840fb124f2bfd3f455afa04ce50b1d3828542b46591f12d32f08bbb9706fba76db301fc507e638e9ed163dc070b6966d024175f92e7d4784c65b44e0e56678b3e711655af6da4ddfdaec0c669985d57ac9c6ab5c13c04af11d154388f79683e73cba9291a6bacc9f550a495e1d15aab7e14b4bd4de16d9908930ecd3c53c1808002bf96e2ac8ffd2ade929b50a74f2c42ca9b0f6e1f8f5c5ede7b0d9eac9570520da19b759697703e6de0afb23c003c91da0d16a29709c459c8b04154640c9c716b01d0a279f6c1489a1363b40f3512d2b8da14904e3a6473bf5cb045081bd075f88e7367df08d381f1ac80728d37bd9047241a688ce74cf322c7faa8b8631f77de91faf226262fa080627f10a1b638377b0c0916f3a7ddcadfc966a7414370c6aaa8f0a2410513be382ede42dedfb5b67106f96ac55fded808bc1f3bcb73e8b537319b6fe089f9438f8e93104b905333caf19d3b7cb445ea663a7b78d3549b49ad47ad93d7aca75ec9cda84f23631f2b8649e86ef82d334f25c2a0ce811cc068a62d9c138881661623ede00e03046db4d8dd7110b3d73f1d5cb3b95f76164fb9090ff83059f84141e3ea12641a8c6d51b2fc6016e980296512b7357401bff568f0cfccb12a7db4458ff31d7fc70f40cb6a57dbca5c6bfbc384758020a8175747fb9a52508c0799a8464bc6e8459d451f6776b11ba5dcabb0945b28a50abd4c36b063d0b402db82325bec27a3224e3ba2b0db4e161f035da5168cdb0d95e97345a357eda063f79a2c85bf15ce4b666244b1bada535d78e554a1fdfb609af48ecf33ee67d0741cc4beab27de6d8dcdcb0e6c7190fffa37755415a77f9b091b48a43eed40b938bc0990e46af8dc3aa6d7109c61bd3f94f4ef97da8554af4acac0d23d82aa66d276bc04b301c9bc37f7fce48ff5b073e7f0cdcbca71ec36759e32dedb3e7ceeb581c4edde131d41accdc2ec23cec13434f91a12962c699bdc48f028fadc06cbb3a3757a09a8a916dead3e1a1dae0dae1eb38647445d3f7131578f437b014a884a4986da662fc6276fd45a21e30b0861dfe856682343ea738dc5ff42c0f2ec47a3161b0991440d64a5375f1633c70677cdd7254af2ad408bbfbecfa6a4917dc80cd04be7b87a40ea42a8bc3c2fc7e82bead86b497935f41dda1bdc6ac32522b96c20fae6f1327088984894d5e34e56e4c7b11ff77695c086d09d3599906773c72619d7f5c684b821413142c3a047f434610676d95a4b024a1fab7d81c98d140e44a8b317c6b8c8337ef07141e936fd7fc6b14ec4c0c23d953010bd24262b6590fde1345d4a5d8237d6c8c20dd06879f9a30b7c3b18499bf0a638077023d162a8e0dc47d3d03e6b8cfeeb748672e33b0ee8f6f29b3cba772a339f15d437a9b1863f74d9ba35346b3285af1c5810fc120e5f8966e39e1f7f4c4dbf8d6321eb3b525a212a4a4235b7f4ffeb27b24f2109d5c7dc7b2db0d6b81f24aa905fd5f07830e5722ca54e101d179af07a2a0e805bca2408a3d05d389ae90199f0b7c6822874238480a195401e49bb1f3b33d17430c89607d19f3229d78b45d47f4539c40259b049f36bd3ae48f2d50c4ff664ee7d82ca83befe82a1925e0ac486f62b8df8682bfb32fc9870095da071e02f4ca3e061773a0d6515b21963380dbfb5204117619c8b6fe9fc9f3fbb52fb1f29a5b71b5fc8734559f4b9f89b432f6d00fb1111a2b5ac9c60a60115c6a78d58a3d1e110f7adc074226934edb657bfbdb2092d5a0d75a4fba5ad0666af223083a5c9f82da9770d40942c116ad0d0c88de7869dead79024673506bb612c0a009ba131f31f604b6443b066bbd1844de014128e45fccd894d4684d659ed96cc52b4bdfde3ae96f47bc960f27d815e6f2a43f52b5918a613bae319f023600acd5bbbe3c2dee4085c79fca3f58fb3ac1fba620c36cdcbe3eea11172d34f8e8cb2a4faa31c403bd030e594e6191439f8a194b2f487e2a68a63167b7778c38be506c6f0b6ce13a9e3309744bc329c8dd3798cecb3546f5d4c926210fe97863aa1abccd3a2f37725df22ac72e68fcd2600589884bf81197e4179a0790beeaceb49dc95f31d48ff4582b92c85f6abb84b3562150f2220e5ef559050d83aeb31686ca6d8f1a6e9069d10bec479cc77da9b96cfef54a9c12f992b8abb5a8af1be5941a992d65e4000978dd31c5f8f8e92ac07641170bf72949c004c934823fed238c07fc2669705c944d5b47be8833f4d842125e226fc67bf69ee1bce25fea55db016fd7b8254f14d57782f8a9e71297f7fadba5aceddcefe214e2976b44ee9ad84a397376ca13d409383b059ded2499b5ea32752f4d0a3848121525d8ad2f6262bc4e92bceb184d3bcda9316e6d8a013bc9d7ef78ec738e687dd67c148d9fc50e648f2b4c0be378527f354740153287f1170862b021d6705d0e61916185684d8bffb1ca88ef99e0eac48c528aefbad810af60e539c1eab3157717dec292e66a515fba752344bc61157569fadc5edfcf494906a668e21e8006829ac2ebe666bb785fe91df08fa60ec7f61aed0155f44fa499c7116a3c17f61a34d3a6f7d0580a4595384ccb55290838c39c0b0c5b158dc8890703d747fb45fc6ca7ab0218599a5ecb651b987e0f49558e0eb5c625210003e80ef8b5318f2dc14f79c96bf952c8aab79be55fbf0c0ee5e7ca26d371afabb21d293ab59eaf72a1e2cc106dea53c37221b05ec10e2b4422b759d1bce8d4087749aef2d10fa0a9d79d0858620e70c002e79f92aeb41962ceee44754653e69affcf5f354b1078bf379069465e6d492b6fbd42580ce1e6da2d601dbadfc216acec1619fcfad16ec34990f5f40a017cf396601bd0f1a5a2255149818b2986bcaf4888f88940588ab235de9c8b09c5d7427a6305d4e1981991ddf9ad61f054e3381c7ee97269e8a13ef2de90217dbf3fc303416326433ecb0c4e45c79c06618bddbd9cb6893eee6488fe92c9aa8fba0e2b1493f6971d46d765170859ef47ca950254cac95b65359008dc0e39c45e764007951e823b5d9a3198a69e803fc164e37d8920f9b3f057e956cee9b1ffa8125fd337b91950a325fa43bffc2a8a99a1de2b05857fd2ce888a21e204743c31a63eb00ae7206618212376205a95b24074a567bbde8c4b808aa3fc76b186b0b935edbee53843d5005ee581f7739606338307ff16a13371a5171a2eec4285f6670f2479683ba8d6e8121fa990f2c163619403b7bc6d5094bc64340aa227c59519c94bca13d7b4449523d1dd316b26dca03c4dc85a83c6b6f6b80876a03f8a0ee659a16f38cd49726102c98b027f311b1138984f7264279ce72df2e1846623892fecccdc3c7811dacdfb4f79fd688ca5096e8a57751b3a5e793bc6dee8b1cb45d5ad850e623de8baea0c4358fef6fb3a1953c5e5a05c2fec7775914bcc7a45780f1a6e2812c16cc4081a6021196af5be5abea0275c3fbcf0989f6af7b067a72ca3f23b3cf76ba01850ddd2e0aff1b93a6153a7429818dfd697a84fe4c59a2301ab933d4f1e56c3ec0b8d9889e441d7592269e1a0db0f73f873afd08664c48404f087467921c600f480d05b3de6461442de3c189bc2172e7ae588bcf746994b2472d155059f5b00fe49d6c602f8e79d0ce9ff644b9a720dff550de3096e9bb1844aea67bc859cdbd397dd9236d7bdf96ad0fd058e8552ca4343cfc6121bf8743b1d8e2c2eb08e3418418953432a05f14d10eb9c15653401513358ae85589af3966be0b104bb7bf01bf693cca3d79513bb99b9e6a18d4baf51a38c4a36378f1879fa5916c8260483722a4381e09093174cd99af72bc5c94babb36ca25fb4e315847969e9b5bb52d7d9366f0481ff0a56eff638f48f07c1c6064de1e5aeefe9b518b0a15a3d601a533d71c841f58345d9e5658e11c6701809b344f4e366739640806c813d195af55f171d6df390828e4f1da5cfb34cffa098ce7d0af23e415a8246e81dec2282e27e479b08fedd51dc4b8b98173811e32ca78188ecd33db37e985741d6be4983dd470d5e3a8edb7d04a2e50851e97e5eb90e81eab20c7e785db36179f4766eca2e28b25562795705dd5cd5d02045e99c0022f07c7594f56bf09b0b175bb5afec197996750536e0f07e7794d2b8a90c878131e7d4ff0a6de362a3fa153b281e6fd6bd11546c174db669aa2ab292a9892c4ea06aa01c240546b41d4639a67733a3d6a419a703e6a0c741891ef303c15fd0f6b15115fd4eec33ca4f2c9c7c4757ccef7bb012913ae3a5eb24ce6c7687fb9a9006cbb202140d70c9bde9ffd3b72488dddd12cea516fdd168549b3e0da9995816e5f8b68864", 0x1000, 0x81}, {&(0x7f0000000980)="b79fb9e9ab4feba22ffb95e39a9060853a62b915f0eaedc37775ddf61fd6675768a619b30e2176b77e8bd8bbc022779a59f7d5babc2fc0f39f0109936c4eca0a445eae8e5246eff2c48d9f929e91903886f9a80d3b1159c0f05001cea72625e5459cfe6bc743788ddd09fc840b7ba65021fa18cea3580fa47ca203c17f3a752fa96354c9c46635e12adccc73f71bcaad70391900e11a7e33452ba5c7b8dec059176166e2f4f3604f", 0xa8, 0x100000000}, {&(0x7f0000000240)="d87255883e3bbad7f5ffa5087cdbc112a8e4e2a026824686e9e5821dd4a27c401f3c5cc87173bd64", 0x28, 0x4}], 0x34048, &(0x7f0000000280)=ANY=[@ANYBLOB='init_itable,subj_role=net/snmp\x00,uid=', @ANYRESDEC=r9, @ANYBLOB=',obj_role=/dev/rfkill\x00,defcontext=user_u,fsname=]posix_acl_access{vmnet0:,obj_user=/dev/rfkill\x00,audit,rootcontext=sysadm_u,uid>', @ANYRESDEC=r11, @ANYBLOB="6e2c6673b8171a240e26361997173777020000006f23002cd57359a07d2206025efba1c002b595a196cdb812846f4cb7dd7f3c656a270b9e60a5e3b492a0d3957be8f22e60080cdde3531a5a456743a9996dac15bb3f3a8e4b3ff5dcfb552da37217ab52b13f000000000000002ae3d747d8defd593b55655506b5eff4421102a85216bcb2ad5ef0ae51bcdf9df9b632397c123263d49b29d911ad34998573418df43aa5c0736dfbb10db88e7f2707674fb279e2166fd0729a561f"]) ioctl$SIOCAX25GETUID(r7, 0x89e0, &(0x7f0000000080)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r9}) 13:55:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:55:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 331.257708] kvm [14022]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x3e95d [ 331.270167] protocol 88fb is buggy, dev hsr_slave_0 [ 331.275264] protocol 88fb is buggy, dev hsr_slave_1 13:55:59 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x294c80) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000140)={0x0, 0x1}, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:55:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:55:59 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:55:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x20000000, 0x40000004, 0x0, 0x401, 0x0, 0x4cb], 0x0, 0x1156f1184b9a1824}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x8}, 0xad13f79a9be89860, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x2, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) dup(r4) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) dup(r5) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0x29496ff28f668cdf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000400)={0x14, 0x88, 0xfa00, {r6, 0x10, 0x0, @ib={0x1b, 0x9, 0xe5e, {"5bf1524cbb15e15b5405cb0d82c8c623"}, 0x101, 0x800, 0x8ac2}}}, 0x90) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9beb554ad1c029f5a478c73f18722e31c085d7fabc1268abdedfe2fd832037ff568f9b618ef85042091f03a52c35e5d6e272368ef98a287116016d67ba4dde593c58df2cd6cace8bfc8f741516bb4b55ea740ecdb60e150886464842424deb25", @ANYRES16=0x0, @ANYBLOB="000226bd7000fbdbdf25010000002800010014000300fe8000000000000000000000000000aa0800090003000000080001000a0000000c001b0008000500020000007400030014000600ff010000000000000000000000000001080003000000000014000600fe80000000000000000000000000000f0800010000000000080007004e2000001400060000000000000000000000000000000001080001000100000014000200767863616e3100000000000000000000080006001f000000"], 0xc4}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:55:59 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000240)='security.selinux\x00', &(0x7f00000002c0)='unconfined_u:system_r:insmod_t:s0-s0:c0,c1023\x00', 0x2e, 0x0) fstat(r0, 0x0) [ 331.698864] *** Guest State *** [ 331.705992] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 331.728764] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 331.767959] CR3 = 0x00000000fffbc000 [ 331.774759] RSP = 0x00000000000004cb RIP = 0x0000000000000000 [ 331.784156] RFLAGS=0x1156f1184b9a1826 DR7 = 0x0000000000000400 [ 331.791048] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 331.798139] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 [ 331.807256] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 13:55:59 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000240)='security.selinux\x00', &(0x7f00000002c0)='unconfined_u:system_r:insmod_t:s0-s0:c0,c1023\x00', 0x2e, 0x0) ioctl$int_out(r0, 0x0, 0x0) [ 331.820600] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 331.828762] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 331.836922] protocol 88fb is buggy, dev hsr_slave_0 [ 331.836973] protocol 88fb is buggy, dev hsr_slave_1 [ 331.848016] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 331.856366] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 13:55:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 331.877503] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 331.898185] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 13:55:59 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000240)='security.selinux\x00', &(0x7f00000002c0)='unconfined_u:system_r:insmod_t:s0-s0:c0,c1023\x00', 0x2e, 0x0) ioctl$int_out(r0, 0x0, 0x0) [ 331.921194] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 331.936125] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 331.944906] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 331.951939] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 331.959976] Interruptibility = 00000000 ActivityState = 00000000 13:55:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:55:59 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) [ 332.034905] *** Host State *** [ 332.049571] RIP = 0xffffffff81174b00 RSP = 0xffff888047b2f998 [ 332.098763] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 332.125688] FSBase=00007fbff8965700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000 [ 332.136407] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 13:55:59 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x400, 0x0) read$eventfd(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x3, 0x20000000021) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000000)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) r3 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000340)) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f00000001c0), 0x2) r4 = socket(0x11, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x7, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bcsh0\x00', 0x10) r5 = socket(0x2, 0x3, 0x81) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(r6, 0xc008af12, &(0x7f0000000280)) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) write$rfkill(r7, 0x0, 0x7) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000100)=0x7ff) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0xb, 0x0, &(0x7f00000002c0)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x80000001, 0x20080) accept(0xffffffffffffffff, &(0x7f0000002280)=@can, &(0x7f0000002300)=0x80) setsockopt(r4, 0x107, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 332.146640] CR0=0000000080050033 CR3=00000000a708e000 CR4=00000000001426f0 [ 332.156926] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018e0 [ 332.204781] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 332.219100] *** Control State *** [ 332.233773] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 332.236329] misc userio: Can't change port type on an already running userio instance 13:55:59 executing program 4: accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x20000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:55:59 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="307b2f7e09dc0acab65b4ccc902a700100ea5b8f159a4c24bb2c174c4150120e06eb93996d505b6a9851b8c63a74b13718c0d46119b10101627ae498056c8a0a9923b0b713d98c2f451be32ba45f1d9d14da2ed6504f60a2301288a5599fc0ec4f57fa0a5c2bc59fffe834b4b41e1a6cc6c1d52ebc4f25370330455a85a093b828395913da5db67f785c9f9dbacec4fd17efbd08856db46806a4b795aa471601c845c480a83e23d3924f70f455d4b3eeb891ea42d967e1cb1b9ac771cef35e2d6c31"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) [ 332.252367] EntryControls=0000d1ff ExitControls=002fefff [ 332.257979] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 332.272542] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 332.279408] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 332.313830] reason=80000021 qualification=0000000000000000 [ 332.323488] IDTVectoring: info=00000000 errcode=00000000 [ 332.347176] TSC Offset = 0xffffff4bcf0a6471 [ 332.365417] EPT pointer = 0x0000000051bd501e [ 332.375219] Virtual processor ID = 0x0001 [ 332.430250] *** Guest State *** [ 332.433900] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 332.450785] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 332.463968] CR3 = 0x00000000fffbc000 [ 332.468689] RSP = 0x00000000000004cb RIP = 0x0000000000000000 [ 332.483909] RFLAGS=0x1156f1184b9a1826 DR7 = 0x0000000000000400 [ 332.504885] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 332.512422] CS: sel=0xf000, attr=0x0009b, limit=0x0000ffff, base=0x00000000ffff0000 13:56:00 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:00 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="ee272f088fa9d97c5a331f191834b3432f8db71284ad047df2eb5719fd22f2684d0c99490f8cd432eb4551d5bc44c87e33ceae33875690552e41cb6e75196aac3972cbe64d7be4efd9e26a55b69746c4a3af26c27658c101cc3c8c753ab216b65dccb1d85443efda56d2be3c02de2919f102beafc6161db2fedd5e7cb3b7a19aad3c8895e6b25067bdb4"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getgid() fcntl$setstatus(r2, 0x4, 0x6000) ptrace$setregs(0xd, 0x0, 0x9, &(0x7f0000000240)="82f2745f71010a330bd0b077be2e05936b32b97847751b9a2e45bdc8f567c80c3ba4b87521b2f78533c9d641766786bc5e458cabc4a80020406963aa11b7da115d7e5353f443fd478a7894d6bb2079686881d7e351f0bb04bc42cac9d2587138649ec33ae6fc17245b10323d8d7140e5091e1d10914a1ac38c3f70343278b06f7455b2ea4f70165a8fa36c2321019f83dca29329066a01da840961f5bd65e77d111b3c5a28b02b57fb116bcd227558427fc0651bc7e766800938e55823363bf3e7dad02351721f2e20882616b6e07a4fe2931df4f9c666bfcc2ac8fb8d92c6491d5f00977be7ba12") io_setup(0x2, &(0x7f00000004c0)=0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r7, 0x401c5820, &(0x7f0000000040)={0x6, 0x4, 0x854, 0x101, 0x8}) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) [ 332.533363] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 332.552919] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 332.604710] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 332.613195] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 332.617435] kauditd_printk_skb: 24 callbacks suppressed [ 332.617444] audit: type=1804 audit(1569765360.294:904): pid=14107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/177/bus" dev="sda1" ino=17073 res=1 [ 332.621699] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 332.645775] audit: type=1804 audit(1569765360.304:905): pid=14107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/177/bus" dev="sda1" ino=17073 res=1 [ 332.697144] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 332.726013] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 332.739209] audit: type=1804 audit(1569765360.344:906): pid=14107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/177/bus" dev="sda1" ino=17073 res=1 [ 332.751332] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 332.781456] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 332.789640] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 332.796572] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 332.808742] Interruptibility = 00000000 ActivityState = 00000000 [ 332.815847] *** Host State *** [ 332.819212] RIP = 0xffffffff81174b00 RSP = 0xffff88809f877998 [ 332.863181] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 332.874676] audit: type=1804 audit(1569765360.344:907): pid=14107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/177/bus" dev="sda1" ino=17073 res=1 [ 332.882526] FSBase=00007fbff88bf700 GSBase=ffff8880aee00000 TRBase=fffffe0000034000 [ 332.913594] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 332.942098] CR0=0000000080050033 CR3=00000000a708e000 CR4=00000000001426f0 [ 332.957617] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff862018e0 [ 332.973936] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 332.982268] *** Control State *** [ 332.985815] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 332.994797] EntryControls=0000d1ff ExitControls=002fefff [ 332.998829] audit: type=1804 audit(1569765360.344:908): pid=14107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/177/bus" dev="sda1" ino=17073 res=1 [ 333.002287] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 333.039555] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 333.046403] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 333.057198] reason=80000021 qualification=0000000000000000 [ 333.063685] IDTVectoring: info=00000000 errcode=00000000 [ 333.069225] TSC Offset = 0xffffff4bcf0a6471 [ 333.077728] EPT pointer = 0x0000000051bd501e [ 333.082258] Virtual processor ID = 0x0001 [ 333.108264] audit: type=1804 audit(1569765360.374:909): pid=14107 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/177/bus" dev="sda1" ino=17073 res=1 13:56:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x1033f) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) write$FUSE_DIRENT(r0, &(0x7f0000000440)={0x58, 0x0, 0x3, [{0x0, 0x100, 0x1, 0x800, '$'}, {0x2, 0x1000, 0x10, 0xfffffffd, 'posix_acl_access'}]}, 0x58) dup(r1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r1, 0x10, &(0x7f0000000200)={&(0x7f00000000c0)=""/154, 0x9a}}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = dup(r4) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0xffffffffffffffff) getsockopt$inet_dccp_buf(r4, 0x21, 0xf, &(0x7f0000000380)=""/169, &(0x7f0000000280)=0xa9) connect$vsock_dgram(r3, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r5, 0xc0305615, &(0x7f00000004c0)={0x0, {0x7, 0x2}}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:00 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x400, 0x0) read$eventfd(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x3, 0x20000000021) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000000)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) r3 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000340)) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f00000001c0), 0x2) r4 = socket(0x11, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x7, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bcsh0\x00', 0x10) r5 = socket(0x2, 0x3, 0x81) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(r6, 0xc008af12, &(0x7f0000000280)) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) write$rfkill(r7, 0x0, 0x7) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000100)=0x7ff) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0xb, 0x0, &(0x7f00000002c0)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x80000001, 0x20080) accept(0xffffffffffffffff, &(0x7f0000002280)=@can, &(0x7f0000002300)=0x80) setsockopt(r4, 0x107, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 13:56:00 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000009000/0x1000)=nil, 0x1000, 0x800002, 0x30, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="bec38bb4722f92e06b206e095b9f9e1af7fbc58657ec973541bdbbf72f2867ddfa5f936eeaaf9809ca0674aac814793699cf7d0780f078614c2159416124165b1ab4066db1a1fd82d8"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x1000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./bus\x00', r5}, 0x10) r6 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 333.147588] audit: type=1804 audit(1569765360.374:910): pid=14110 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/177/bus" dev="sda1" ino=17073 res=1 [ 333.239658] audit: type=1804 audit(1569765360.904:911): pid=14126 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/178/bus" dev="sda1" ino=17137 res=1 [ 333.276463] misc userio: Can't change port type on an already running userio instance 13:56:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x2000, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000180)=0x7, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) accept4$alg(r2, 0x0, 0x0, 0x81c00) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1ff, 0x0) ioctl$VIDIOC_S_PARM(r4, 0xc0cc5616, &(0x7f0000000380)={0x4, @raw_data="9bc16c7f10eb16172d305152a7ad04293306fe6f8e72675ca8e812c98363b0adfc4ad8f3dad53715e8ea38c825945189ec72817adb0ba8ef141bc8c81f3419b567df89bfc5dda9bb3d0ac7773f60f8b5be905b9b69732b8f700bc493f4394d584b0f2b3401d56b154eddab78a3ff7deab8c86eba3dd664da55e06daabdeeb44fb53ce1695884dc8ee0d0ff29c91416d2bfbc7ee83ddbb8ce6309d00746c0548f366fd7fc793357e7c51dca502a25dc289fcc75b0ad9c0bb972b94517d5c9aa52580ccf4b9f534ba6"}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 333.409692] audit: type=1804 audit(1569765360.914:912): pid=14126 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/178/bus" dev="sda1" ino=17137 res=1 13:56:01 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:01 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="149c00008c47d854"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xac0, 0x0) getpeername$llc(r3, &(0x7f0000000140)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000180)=0x10) [ 333.514052] audit: type=1804 audit(1569765360.914:913): pid=14126 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/178/bus" dev="sda1" ino=17137 res=1 13:56:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0xae52, 0x6, 0x0, 0x9}, {0xffff, 0xc1, 0x1, 0x100}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:56:01 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6aec54cf7ad4351614bbb7f542e42e8814d1c2d7e0877bde2c97631b6b3c0c55ad30dc7267acdae3a1162c695e931edf6a79649ba472e5aff47bc1f908732f11b2068f9efdaf778fd3b78ef53b7b52a33c7fff63e1ebb7bad67cd2008461905db3abe3ed44ca937753a2407643cc751b673d620812cae6e469dd2f1037a3"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080)=0x7f, 0x4) close(r3) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) listxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000580)=""/4096, 0x1000) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:01 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x400, 0x0) read$eventfd(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x3, 0x20000000021) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000000)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) r3 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000340)) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f00000001c0), 0x2) r4 = socket(0x11, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x7, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bcsh0\x00', 0x10) r5 = socket(0x2, 0x3, 0x81) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(r6, 0xc008af12, &(0x7f0000000280)) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) write$rfkill(r7, 0x0, 0x7) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000100)=0x7ff) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0xb, 0x0, &(0x7f00000002c0)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x80000001, 0x20080) accept(0xffffffffffffffff, &(0x7f0000002280)=@can, &(0x7f0000002300)=0x80) setsockopt(r4, 0x107, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 333.882507] misc userio: Can't change port type on an already running userio instance 13:56:01 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x0) fcntl$getownex(r6, 0x10, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:01 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:01 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x40001, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r1, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="2c536f34e0533ec9d1402168943db36896ebc415927c67971552b2920a00568b661f7b677e563142d65ba9822f9edcef5ea3d476b03d084bcb355c08b57d8e3694e812e100763be975489f8b6721e8d591edf9555ad377d381449be11abf47ec44d0e33ec45965389dd3"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setxattr$security_smack_transmute(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x3) fcntl$setstatus(r3, 0x4, 0x6000) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="7065726d70726f66b0406b80706f7374785f61636c5f6163636573bdb0e5ab3100"], 0x21) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:01 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000000c0)=0x3ff) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) sendmsg(r1, &(0x7f00000007c0)={&(0x7f0000000100)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)="12c5996f1a07bef6e21a8b7f3b9b0ec3cff0872d569baa8dbff16137bf1254527e25a3450d1d1a9d643b220855b5c7a4ed17f4030ff2bb6e38da21615dd4c6e318f0df006f070c057b3017ec0b37b564b0e9b4ea791f08990566dce8ba177f3a51967817f0c8dc6674d9a25c9d40dffc902c7935", 0x74}, {&(0x7f0000000380)="533c80015641eed65176f0589368bccc81edef940d622407c478adb2f95a4f90ac7b31c13d7b530bc0dc96e692c87bd23c2abc14b36af96ac96dde53e734c5b920e1ef7a5510d99d91f6710c0c06", 0x4e}, {&(0x7f0000000400)="5992b32bd3b189630b1042267976dd84f21dcafecdc67dcedaf673a1498b748d8444650cb289135aab62cba6f515a69404042a6efc19aafd9927e8aba6bcaf539e7d1cb851ff4e9bc255e1672a0ace3790ac0b84b3d04f801829af78a2cf01e633a6a38cad1b5dda8875e755217a6de29a617386f7c8fd84a9e7ad5bbc9018da206d479a5c0ca6ab504c177176e9e7a6b1e9df1ab4482be17e56e235e1a4ec8306be8045818ed96ad6b87a327343a7afab1b", 0xb2}, {&(0x7f0000000280)="36e2c8dfe86c7e6e65351b867f4bba321da578dfbebb8efe256591", 0x1b}, {&(0x7f00000004c0)="b7af9235a001af9237d918f9b5dbd219f8a28eb2d768c04c29c65df5199ef3112d9c1b25891132bc9c5399ae033c2066f056d9c0c76cb5a7d2e04c2d4e6eefb7018b4cc4e7f114727f0d8213760b", 0x4e}], 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1f8}, 0x8a88c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) connect$caif(r2, &(0x7f0000000080)=@dbg={0x25, 0xff, 0x6}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 334.084685] QAT: Invalid ioctl [ 334.112397] QAT: Invalid ioctl 13:56:01 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$apparmor_exec(r1, &(0x7f0000000c80)=ANY=[@ANYPTR, @ANYRESHEX, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000300)=ANY=[@ANYRES16=r0, @ANYPTR64, @ANYRESHEX=r3, @ANYPTR, @ANYRES64=r4, @ANYRES32=0x0, @ANYPTR=&(0x7f0000000700)=ANY=[@ANYPTR=&(0x7f0000000e40)=ANY=[@ANYRES16=0x0, @ANYRESOCT=r7, @ANYPTR64, @ANYRES32=r8, @ANYBLOB="64243416423b62039777a1957c628c21dac4dcb2e420a4cb4c59fe5d9110e6922b8d056e26ab6dcc8f4aecf48a0008b4c4a1ad51dd1fd5df5a297b264b77b68e587a50c451f9fe903eeff58b64e198c52882a2afcd99383fabe783d501fec930b0dee6380a420101a8", @ANYRES32=r5, @ANYRESDEC, @ANYRES16=0x0], @ANYRESOCT], @ANYPTR64, @ANYPTR64], @ANYRES16=r1, @ANYRES16=r5, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32=r6], @ANYBLOB="882473efcbe521a61b8010d21092a9939f9057f73a818606a0c9808bad3e67672fb6f8b79bdf2156ac9fdd972d8248fae14b68a8cc31f3bddf23c5eb75a40842534df416ebeeeadacd419a2126c050372272881d53a7a3169fc3517c0f19fdcf065d425dd1493afbacd476ce46d1e279cb2ab7a4640c2d9e6e2fdeb627e10131e2af3c9ec616db17db0f53d9659d3adeb9e1a387bb69ea842a918f585de82e541af9ff1e51ec"], @ANYBLOB="c3c93ef5882015d744c0d9e1cf435b61ed48f040b4fa8b69db31a70ad9c7b65733b45b9a27a84b5340789b430a95b66ad4aaf99f7bd803aa0c891b0f2dc235490be685676900d0ae3e015de49f6be2291e132477c9052cc6d9166274011c34bd7af2d031728bc53aadaaaa25ac56db2769810e8a", @ANYBLOB="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"], 0x5) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='./bus\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r12, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r12, 0x6612) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r14, 0x407, 0x0) write(r14, &(0x7f0000000340), 0x41395527) dup(r14) setsockopt$IP_VS_SO_SET_ADD(r14, 0x0, 0x482, &(0x7f0000000140)={0x0, @broadcast, 0x4e21, 0x4, 'sed\x00', 0x2, 0x4, 0x4d}, 0x2c) io_submit(r13, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r16, 0x0) r17 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r17, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r17) setsockopt$inet_tcp_int(r17, 0x6, 0x0, &(0x7f0000000240), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r17, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000200)='./file1\x00', 0xffffffffffffff08, 0x5, &(0x7f0000000740)=[{&(0x7f0000000800)="7f9dd09318bb27dc3b624fe8b8c10cdfc3bf6c69a28bcde9f16a26d6258ac8caa0bbc17d216d29f96cfdb599aa3b32dff7ce96f08f2e6edddf38a3903c0e3d32ba171fa8bdc59ec909194a4ac5b9f8b78ae99b4fea5c0dde9799f8515d9294bfb420f556e863147732b390ed89dbda94d30e08a72bac51d165fe116e11897f65dfe7547e23102d67145e79f893e1c7196f899a06e6703203e696443bdc6a69bd18", 0xa1, 0x6}, {&(0x7f00000008c0)="49c307edf94cded61e37c66fa6b57a7afeec8e5cf96e1a2b9d0d5eec8e9b0b1865b3e37bb4971218d0fd3cbcba8e86b6f216af6d38b98eb34a1e94d99641ee78973f7a0f983f771d66906a95633f1517fe9864bfcfe2a2b4f352625f07137f64f0f45ce467c15644d564e0e64a0ab67545ef4a0327f0c5bd30bd92cae3896ebc02838c31ac842e61ac4e34f301952ebdf3bd0ee4ed4f09f73c8e2667050f148539", 0xa1, 0x5}, {&(0x7f0000001340)="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", 0xfffffffffffffe3c, 0x81}, {&(0x7f0000000980)="b79fb9e9ab4feba22ffb95e39a9060853a62b915f0eaedc37775ddf61fd6675768a619b30e2176b77e8bd8bbc022779a59f7d5babc2fc0f39f0109936c4eca0a445eae8e5246eff2c48d9f929e91903886f9a80d3b1159c0f05001cea72625e5459cfe6bc743788ddd09fc840b7ba65021fa18cea3580fa47ca203c17f3a752fa96354c9c46635e12adccc73f71bcaad70391900e11a7e33452ba5c7b8dec059176166e2f4f3604f", 0xa8, 0x100000000}, {&(0x7f0000000240)="d87255883e3bbad7f5ffa5087cdbc112a8e4e2a026824686e9e5821dd4a27c401f3c5cc87173bd64", 0x28, 0x4}], 0x34048, &(0x7f0000000b40)={[], [{@subj_role={'subj_role', 0x3d, 'net/snmp\x00'}}, {@uid_eq={'uid', 0x3d, r16}}, {@context={'context', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, ']posix_acl_access{vmnet0:'}}, {@obj_user={'obj_user', 0x3d, '/dev/rfkill\x00'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r18}}, {@fsname={'fsname', 0x3d, '/dev/swradio#\x00'}}]}) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000280)='./control\x00', 0x0, r19) write$P9_RGETATTR(r12, &(0x7f0000000240)={0xa0, 0x19, 0x1, {0x200, {0x11b, 0x0, 0x7}, 0x20, r18, r19, 0x3, 0x2, 0x1, 0x5, 0x2, 0x57, 0x3, 0x44d0000000, 0x7ff, 0x8, 0x0, 0x10001, 0x8000000000, 0x4, 0x7b}}, 0xa0) 13:56:02 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x400, 0x0) read$eventfd(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x3, 0x20000000021) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000000)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) r3 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000340)) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f00000001c0), 0x2) r4 = socket(0x11, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x7, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bcsh0\x00', 0x10) r5 = socket(0x2, 0x3, 0x81) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(r6, 0xc008af12, &(0x7f0000000280)) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1, 0x0) write$rfkill(r7, 0x0, 0x7) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000100)=0x7ff) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0xb, 0x0, &(0x7f00000002c0)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x80000001, 0x20080) accept(0xffffffffffffffff, &(0x7f0000002280)=@can, &(0x7f0000002300)=0x80) setsockopt(r4, 0x107, 0x0, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 13:56:02 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 334.353069] misc userio: Can't change port type on an already running userio instance 13:56:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c00804ee36cbdf20db3e6d1ae9236cf45bfb5d5ed8d0e1efab1bf1512fc4dc16ef76beb37d37fb1264e450d305c542f5e46b3f71428dda2010c6200"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xffb8) socket(0x10, 0x2, 0x0) [ 334.514557] overlayfs: filesystem on './file0' not supported as upperdir 13:56:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c00804ee36cbdf20db3e6d1ae9236cf45bfb5d5ed8d0e1efab1bf1512fc4dc16ef76beb37d37fb1264e450d305c542f5e46b3f71428dda2010c6200"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xffb8) 13:56:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x20000) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000180)={0x2b}, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x3f, 0x0) r5 = socket$inet6(0xa, 0x2000000080803, 0x5) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}}}, 0xe8) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) getsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000240)={@mcast2}, &(0x7f0000000280)=0x14) ioctl$KVM_RUN(r3, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) futimesat(r6, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)={{}, {r7, r8/1000+30000}}) 13:56:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c00804ee36cbdf20db3e6d1ae9236cf45bfb5d5ed8d0e1efab1bf1512fc4dc16ef76beb37d37fb1264e450d305c542f5e46b3f71428dda2010c6200"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket(0x0, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xffb8) [ 334.839718] overlayfs: filesystem on './file0' not supported as upperdir 13:56:02 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0x124, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x800}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffff0cc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x3, @loopback, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3f, @mcast1, 0x5}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2e}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @local, 0x80}}}}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000000}, 0x4024000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:02 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) dup(r4) fcntl$setlease(r3, 0x400, 0x0) write$apparmor_exec(r1, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESOCT=r2, @ANYRESOCT=0x0, @ANYRESOCT=0x0, @ANYBLOB="64e2bcee2fa00d5aa2e35fb07151a73e9c0eee08011e517942e5e8132314c30d911d0a74d20b42427e537db86a879f1a496c516e892533e621deab92b06d65beb6ffc1aa2b2cdcf632a2abe16b364d23f579d2dbf1e21cad612ef726753ca71660d2c06b8fa623e5c2ecc3779fa56843664f000000000000000000", @ANYRES64=r4], 0x6) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:02 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c00804ee36cbdf20db3e6d1ae9236cf45bfb5d5ed8d0e1efab1bf1512fc4dc16ef76beb37d37fb1264e450d305c542f5e46b3f71428dda2010c6200"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket(0x0, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xffb8) [ 335.129256] overlayfs: filesystem on './file0' not supported as upperdir 13:56:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0xe2000) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000100)=0x8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:02 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x20000000021) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000000)={0x1, 0x6}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, 0x0) close(0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000280)) accept(0xffffffffffffffff, &(0x7f0000002280)=@can, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 335.430122] net_ratelimit: 16 callbacks suppressed [ 335.430128] protocol 88fb is buggy, dev hsr_slave_0 [ 335.440218] protocol 88fb is buggy, dev hsr_slave_1 13:56:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x800, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xda0}]}, 0x24}, 0x1, 0x0, 0x0, 0x40004}, 0x4000) 13:56:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 335.707406] kvm_hv_get_msr: 57 callbacks suppressed [ 335.707414] kvm [14279]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 [ 335.720785] kvm [14279]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 [ 335.728752] kvm [14279]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000a [ 335.737175] kvm [14279]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000c [ 335.747901] kvm [14279]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000e 13:56:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 335.990124] protocol 88fb is buggy, dev hsr_slave_0 [ 335.995317] protocol 88fb is buggy, dev hsr_slave_1 13:56:03 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) getrandom(&(0x7f0000000140)=""/131, 0x83, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="ea91b977cf8532371d770a87fe1d94b6c034e4904b5b3e6e6b46b28a39517eac229e9d54ad3e73f2d772eb5862aaab"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) dup(r6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r6, 0x80045500, &(0x7f0000000040)) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:03 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:03 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:04 executing program 0: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) dup(r4) fcntl$setlease(r3, 0x400, 0x0) write$apparmor_exec(r1, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESOCT=r2, @ANYRESOCT=0x0, @ANYRESOCT=0x0, @ANYBLOB="64e2bcee2fa00d5aa2e35fb07151a73e9c0eee08011e517942e5e8132314c30d911d0a74d20b42427e537db86a879f1a496c516e892533e621deab92b06d65beb6ffc1aa2b2cdcf632a2abe16b364d23f579d2dbf1e21cad612ef726753ca71660d2c06b8fa623e5c2ecc3779fa56843664f000000000000000000", @ANYRES64=r4], 0x6) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x23}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffff8, &(0x7f0000000100)}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ftruncate(r1, 0x1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x6, 0xbcae, 0x9605}) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 336.470924] protocol 88fb is buggy, dev hsr_slave_0 [ 336.476501] protocol 88fb is buggy, dev hsr_slave_1 13:56:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x80000, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 336.550131] protocol 88fb is buggy, dev hsr_slave_0 [ 336.555487] protocol 88fb is buggy, dev hsr_slave_1 13:56:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 336.626617] kvm [14334]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 [ 336.639449] kvm [14334]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 [ 336.647948] kvm [14334]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000a [ 336.656379] kvm [14334]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000c [ 336.665434] kvm [14334]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000e 13:56:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 336.710556] protocol 88fb is buggy, dev hsr_slave_0 [ 336.716073] protocol 88fb is buggy, dev hsr_slave_1 13:56:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) dup(r4) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fcntl$setown(r4, 0x8, r5) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r7, 0x23f, 0x0, 0x0, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10004220}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010025bd7000fbdbdf25010000000000000002410000001000137564703a73797aeccf00000077e581a5fb3704af2b6617ebb89062dea98cf8afb6114aef15aceb60043f41fa77d63d6f9c426c62e66cefa2368b27201b8f458aa5d7680889871a8057c542260637955448f77a577cccd23e5ef02bbd41260fa43b72cb94a54fd2f9098d3ba9724229cad868ff8900a7bea2e31d163ab450487991c222e907d39bbfa81303d83fb549e046ca65205330f06114c1edd0378c9fd33e5c186bbef71099c1d1c05dc322e13bd8b6bb"], 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$SG_GET_VERSION_NUM(r3, 0x2282, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:04 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="422f4efeddeeaafa668891370b27c6a685c3f1c68c10a0273903f2203561a60d2a4bc1d877bffbfafe2b29ceb2b8261e34e553da2d55725c348296f07fc2bfd56e0cc82eef19d8a924ab5c5bcd26fb09fa0c3b60abd87a7b01fd81dc855a50f0a45be869b14752fb75744c1a9ca0bae848e7c67c9dec97cc86"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x2000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:04 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:05 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:05 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="db9dde514e5e23a2f1c93e9af434b95afc6b8fa737325bbf4765932b0310e307c246f9a5e9fe6babfc38ca0c24c514fdf6ec6e30d7eebbcf18bb65f0c4ec14050c6b42f94cab9bc3f00cf187aed78e0569befc9563ca5fa6378adeb168db123741f42e5b8c436d9b486306c7dfafe150dda3f084dcf4e314d99b4a4d1d9b19c396df9263caf941a52f5278d5e878353e0bb466fcf3d300737b46f77cd38f4e"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TIOCLINUX6(r6, 0x541c, &(0x7f0000000080)) connect$tipc(0xffffffffffffffff, &(0x7f0000000140)=@name={0x1e, 0x2, 0x3, {{0x41}, 0x1}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:05 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000080)={0xc0, 0x5, 0x4, 0x16c, 0xfff, 0x7}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:05 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="5d51efb69e582409a45051ae509adb866b90b79be9ddd1f4f1a4c82b161c01d0234fd6b2ed045ae89b1d165d3884f26cfd8ed161f731fdb38501005009194b6497c116e003e8a654b9094778dbcd450a04efbbcabfc9e39dbdcee7b446e8ce71f8f2858e8558d02a8e91aceca3aaeb928d55dea1ad27980a324f2c79c3a65d00d4050cec85dbdf6304392ad05ea454ee6fb2a498b96e6a23963eb102491bf250f9fcbf73c9405fb987839e90f55cbfcc4d89a9ba235107404387539e4e4c16561b04604f451aef2d56e84b5889fa"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r6 = socket$isdn_base(0x22, 0x3, 0x0) signalfd(r6, &(0x7f0000000040)={0xfffffffffffffff7}, 0x8) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r4, 0x4, 0x70bd2b, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 337.755783] kauditd_printk_skb: 61 callbacks suppressed [ 337.755792] audit: type=1804 audit(1569765365.424:975): pid=14407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/188/bus" dev="sda1" ino=16914 res=1 [ 337.803721] audit: type=1804 audit(1569765365.434:976): pid=14407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/188/bus" dev="sda1" ino=16914 res=1 [ 337.831361] audit: type=1804 audit(1569765365.434:977): pid=14407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/188/bus" dev="sda1" ino=16914 res=1 [ 337.859438] audit: type=1804 audit(1569765365.474:978): pid=14407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/188/bus" dev="sda1" ino=16914 res=1 13:56:05 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 337.887468] audit: type=1804 audit(1569765365.484:979): pid=14410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/188/bus" dev="sda1" ino=16914 res=1 [ 337.915620] audit: type=1804 audit(1569765365.484:980): pid=14407 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/188/bus" dev="sda1" ino=16914 res=1 13:56:05 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$getregs(0x5bbcf3f06b93348c, r0, 0x7, &(0x7f0000000080)=""/47) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xc4cfb6a88ec8f73e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2042, 0x2, 0x0, 0x8, 0x0, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x11) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:06 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{}, {}, {}, {0x0}]}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, r6, {0x0, 0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00', r6}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@mcast2, r7}, 0x14) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000100)={r2, 0x2}) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:06 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x8) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="d8ccf0b42035a964f4"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TCGETS2(r5, 0x802c542a, &(0x7f0000000180)) r6 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x400001, 0x0) r7 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7fff, 0x40000) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r8) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r9, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 338.475025] audit: type=1804 audit(1569765366.154:981): pid=14447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/189/bus" dev="sda1" ino=17106 res=1 [ 338.523093] audit: type=1804 audit(1569765366.154:982): pid=14447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/189/bus" dev="sda1" ino=17106 res=1 [ 338.587899] audit: type=1804 audit(1569765366.154:983): pid=14447 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/189/bus" dev="sda1" ino=17106 res=1 13:56:06 executing program 2: creat(&(0x7f0000000040)='./bus\x00', 0x80) r0 = open(&(0x7f0000000200)='./bus\x00', 0x40040, 0x10) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x4) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) [ 338.767251] audit: type=1804 audit(1569765366.444:984): pid=14462 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/190/bus" dev="sda1" ino=16883 res=1 13:56:06 executing program 3: mkdir(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:06 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) dup(r2) dup(r1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000240)={0x1, 0x9, 0x1000, 0x43, 0x3}) r4 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0xfffffffffffffc00, 0x800) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xfffffead}], 0x201, 0x0, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000140)) ftruncate(0xffffffffffffffff, 0x7) r7 = semget$private(0x0, 0x0, 0x2) semctl$GETPID(r7, 0x0, 0xb, 0x0) semctl$GETNCNT(r7, 0x0, 0xe, &(0x7f0000000380)=""/214) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000001740), 0x0, 0x4) setsockopt$bt_BT_SNDMTU(r8, 0x112, 0xc, &(0x7f00000001c0)=0x2, 0x2) ioctl$KVM_RUN(r6, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r10 = openat(r9, &(0x7f0000000480)='./file0\x00', 0x533f25300a07b0b8, 0x1) ioctl$TCSETA(r10, 0x5406, &(0x7f00000004c0)={0x401, 0xffff, 0x6, 0xc2c0, 0x15, 0x8, 0x6, 0xc0, 0x3da, 0xd}) ioctl$KVM_RUN(r6, 0xae80, 0x0) 13:56:06 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {}]}) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x349, 0x3) 13:56:06 executing program 0: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:06 executing program 0: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:06 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x35}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000080)={0x0, @reserved}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0xe6d, 0x0, 0x10001, 0xb63}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000380)={r3, 0x3}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f00000003c0)={0xc, @vbi={0x79, 0x8, 0x80, 0xda513a4c, [0x2, 0x510], [0x10001, 0x9], 0x1}}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r5, 0x54a0) dup(r4) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000200)=0x1, &(0x7f0000000240)=0x4) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000140)={0x0, 0x0, {0xffffffff, 0x2, 0x4, 0x561}}) 13:56:07 executing program 0: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:07 executing program 3: mkdir(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:07 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x20001, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000140)={&(0x7f0000037000/0x4000)=nil, 0x4000}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000180)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:56:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000004c0)=0x8) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x31b040, 0x0) sendmsg$nl_route(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@ipmr_getroute={0x1c, 0x1a, 0x40, 0x70bd2c, 0x25dfdbfd, {0x80, 0x14, 0x0, 0x3f, 0x0, 0x0, 0xfe, 0x8, 0x1800}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008814}, 0x100) socket$inet6(0xa, 0x802, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000140)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x2de}}], 0x2, 0xc0811) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x10, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$radio(&(0x7f0000000440)='/dev/radio#\x00', 0x2, 0x2) timer_create(0x0, &(0x7f0000000640)={0x0, 0x19, 0x1, @thr={&(0x7f0000000500), &(0x7f0000000540)="a25731bb310e69ce81a95b9ad57a56ff3971d2a89fd776f1d1af207ee34fb1f614d851150f7e03e7e9e7f5f3eef2d99c22d5a7b96a87716e62dc9b090c6b5119b20dc8949c56d958b673b27e021ad78a4880960e5a01f019fbfd2bc84edff4621437d9302304c236967413e8ee15c90835d072c5181b1e586e4bda62cd6d53e00eefcca7564e8fad5bdad082b31b98e3118435cc3891c966ec5a2acc4f69ad7628b52796ae6289461ae4dca8e449c67d0332abeab19638fd743b1c26dede06a85752bea0ba424ec6d2e80db74ea3ff1eafba74fe75448646b8c394"}}, &(0x7f0000000680)) r6 = accept$inet(r5, &(0x7f0000000500)={0x2, 0x0, @dev}, &(0x7f00000006c0)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f0000000700)={0x0, 0x1, 0x68, 0x40, 0x5}, &(0x7f0000000740)=0x18) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f0000000480)=0x1, 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:56:07 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="a9eff4dd28e1b93d77fe9b8cc5bcf63c31910f"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$IMGETDEVINFO(r7, 0x80044944, &(0x7f0000000440)={0x1}) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20850000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="1e6967d3", @ANYRES16=r8, @ANYBLOB="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"], 0x200}, 0x1, 0x0, 0x0, 0x41}, 0x1000) 13:56:07 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x200000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000100}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="348d0004", @ANYRES16=r4, @ANYBLOB="20002dbd7000fedbdf2507000000080004000000000008000500080000000800050000000000080005009a000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x800) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r5) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L-', 0x6}, 0x28, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000380)=ANY=[@ANYRES32=r7, @ANYBLOB="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"], 0x73) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:08 executing program 3: mkdir(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xffff, 0x678662) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x12000a}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0x190, 0x0, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="8d8e96855a8f85f1e874cf0569c0477a"}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fffffff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x25}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7a}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_hsr\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3b48}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1141906e06797cd9}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80000000}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x800}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x190}}, 0x80) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 340.630114] net_ratelimit: 14 callbacks suppressed [ 340.630119] protocol 88fb is buggy, dev hsr_slave_0 [ 340.640220] protocol 88fb is buggy, dev hsr_slave_1 13:56:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 340.710144] protocol 88fb is buggy, dev hsr_slave_0 [ 340.715281] protocol 88fb is buggy, dev hsr_slave_1 13:56:08 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="5bb4d9db7400001d8a57e2000000530eef8dcbf98eb1f9d8611b4414b69f87387a97b370feb613db20c8db26c169e6317180da6e9f"], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:08 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x200000) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x400000, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) dup(r4) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000380)={0x29, "cee5eedb1dc879847943f78e41db00f30500adf557aecc6958177843ad9a023e972e7d5f968fcd9eca9cce06c52d2e1b64c4009ae30980aa6ed3174d3e0a96c288686768344e3a631426b5dfe652c6ac175da3e4ef19445abdf62ee622f115514936b90b3d27c4eded5f5c47137406654af844f7f2b7b015888e119921adbe7c"}) [ 340.870396] protocol 88fb is buggy, dev hsr_slave_0 [ 340.875541] protocol 88fb is buggy, dev hsr_slave_1 13:56:08 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x20100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x13f, 0x1}}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:08 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="c98e0800a40000e70000005af5b582ec40f8e41c59368f8e09be8f7e0d28da53a29b3943f29f4a875adb521257840893be7c04786e39d00a883dcff7ffffffffffffff88c9b52dcd17cc663ac352471f1820310414afc6c60c1fed090054d8c1fe8289d514232f45ffcdf1e27b36a6"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:09 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:09 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) syncfs(r1) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:09 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0xe295) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) [ 341.680148] protocol 88fb is buggy, dev hsr_slave_0 [ 341.685281] protocol 88fb is buggy, dev hsr_slave_1 13:56:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) accept4(r2, &(0x7f0000000140)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000080)=0x80, 0x800) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in=@empty, @in=@empty, 0x4e21, 0xe5d5, 0x4e23, 0x8, 0xa, 0x20, 0x20, 0x3a, r4, 0xee00}, {0x9, 0x36, 0x9, 0x69dc, 0x4, 0x6, 0x400, 0x4}, {0x9, 0x5, 0x6711, 0x7}, 0x0, 0x6e6bb7, 0x0, 0x0, 0x3, 0x1}, {{@in6=@mcast1, 0x4d6, 0x6c}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x2a}, 0x0, 0x0, 0x2, 0x80, 0xffffffff, 0x4, 0x8}}, 0xe8) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:09 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f00000000c0)={{0x3, 0x0, @identifier="2245f49d299225ddbf4ba0826ae6e3b8"}}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) r3 = accept4$unix(r2, &(0x7f0000000500)=@abs, &(0x7f0000000080)=0x4b, 0x80000) recvfrom$unix(r3, &(0x7f0000000380)=""/232, 0xe8, 0x80004040, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e22}, 0x6e) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FICLONE(r5, 0x40049409, 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:09 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x100) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="c949c765b52945c7c9eeb3b0d3c09af64e4068f7fc2ce7d8c1e08e7381c14592b1945dfa04742dcd49b7adfac25e01c214ad9c92e09f2cc9355a00e30228a8aed4b8a04e2a0f44a0d3a320ffbbe616dc1a9181dcb9590c3272ffd75df1be49922077c2a37c5266dff6cabe89d800a840808dbd622c11a9a6f6de4f32715bdf"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VHOST_SET_LOG_FD(r6, 0x4004af07, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000240)) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) [ 341.965677] kvm_hv_get_msr: 14 callbacks suppressed [ 341.965687] kvm [14651]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 [ 341.995508] kvm [14651]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 [ 342.018469] kvm [14651]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000009 [ 342.037259] kvm [14651]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000b [ 342.049171] kvm [14651]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000d [ 342.074586] kvm [14651]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000d [ 342.097170] kvm [14651]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000d [ 342.230650] protocol 88fb is buggy, dev hsr_slave_0 [ 342.235887] protocol 88fb is buggy, dev hsr_slave_1 13:56:10 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x10a000d02) 13:56:10 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 342.680541] kvm [14651]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 [ 342.720337] kvm [14651]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 13:56:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) r4 = dup3(0xffffffffffffffff, r3, 0x100000) connect$nfc_llcp(r4, &(0x7f0000000140)={0x27, 0x1, 0x1, 0x5, 0x8a, 0x40, "a78b780c9c4cddac050c20ab91a2db8c73c2e03b126a7bd516c014c9c788cfc415474bb9f276f17f5d775f99810763984975ae35ff6e49bc854eb2906050e8", 0xc}, 0x60) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x10a000d02) 13:56:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000140)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x800) dup(r0) write$P9_RLERROR(r1, &(0x7f0000000080)={0x92, 0x7, 0x2, {0x89, '/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f'}}, 0x92) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, 0x0, 0x10a000d02) [ 342.819969] kauditd_printk_skb: 51 callbacks suppressed [ 342.819978] audit: type=1804 audit(1569765370.494:1036): pid=14674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/197/bus" dev="sda1" ino=17313 res=1 [ 342.898653] audit: type=1804 audit(1569765370.534:1037): pid=14670 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/197/bus" dev="sda1" ino=17313 res=1 [ 342.964792] audit: type=1804 audit(1569765370.534:1038): pid=14670 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/197/bus" dev="sda1" ino=17313 res=1 13:56:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0), 0x10a000d02) [ 343.008200] audit: type=1804 audit(1569765370.534:1039): pid=14674 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/197/bus" dev="sda1" ino=17313 res=1 13:56:11 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0), 0x10a000d02) 13:56:11 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="c4ef75332384d2d4ac89024d44d796dd0345b830050086fea4b6c88cba4a1a04184e6553e74edc8f2baae6add9fb81c14a588e1c17ef0906a4fc1487523f8b576e526308d538a249c1d8987ab7e32d4fbd0bad4c556fbbbb03b41354af66a47b6d00000000bda367a366d2b58192d3b97155b2004aa7467b7f8c2dafb488d825d63c58c852542cb037a36b5351e7953c9e0796b296104d59dbca8017eaf65c0e659253ac598ff48d3968c462f22a5b16dc"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xfc, r7, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb38}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8eac}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40000}, 0x810) sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r7, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0), 0x10a000d02) 13:56:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x0) [ 343.382322] audit: type=1804 audit(1569765371.054:1040): pid=14732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/198/bus" dev="sda1" ino=17347 res=1 13:56:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x0) 13:56:11 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 343.455430] audit: type=1804 audit(1569765371.094:1041): pid=14732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/198/bus" dev="sda1" ino=17347 res=1 [ 343.504094] audit: type=1804 audit(1569765371.094:1042): pid=14732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/198/bus" dev="sda1" ino=17347 res=1 [ 343.542805] audit: type=1804 audit(1569765371.114:1043): pid=14732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/198/bus" dev="sda1" ino=17347 res=1 [ 343.576258] audit: type=1804 audit(1569765371.114:1044): pid=14732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/198/bus" dev="sda1" ino=17347 res=1 13:56:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x4, 0x400000) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000140)={0x5, 0x10000, 0x1ff, 0xc, 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x0) [ 343.610673] audit: type=1804 audit(1569765371.124:1045): pid=14732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/198/bus" dev="sda1" ino=17347 res=1 13:56:11 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000080)={0x4, 0x80000000, 0xffffffff}) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:11 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="43a90db8cf857a51f50b089438075880078e70ecf85cb150303b0792396d8a2c26532b1ac7951f321ed615efa150d82bfb43f7ed186b53b6b6e3ea"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:11 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:11 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:11 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x80, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:12 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:12 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="619289949e75928cfbd192d991bdb6f7ded0f1dbc7ddb4046a0e361ab7ce93f2f20516ba49324a468f4e4338f3b444a6e0268a348f267a10373db6bd26629b97476dc7f9a7c7b55e2c1fa9205ec7c93b9fee6e5a712f74d1942af50300000063"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$sock(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000240)="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", 0xfe}, {&(0x7f0000000040)="5f6abe8986f03c23a5969699d09e8b8a1a3bf8dc09707decbaffd98b7e2aa64a7801cb6e794c5d99a75fcb50b8c9800a81947062d2cb69fa45c3fba5cf8dd0c4d8", 0x41}, {&(0x7f0000000140)="fef1bdb4e7cdbf04b6fe3b41d02f3caf3168eef17206f26fd7328ee048a7179e17d393628c930ec867c9051ede006164085e4e83fd1cb23992738fc4d8251bc21ff37022cec63aa61fbb4c5c2ab3b335f6a079772a3ee778f4d1fc278ff33ef1b9b1ec172f80418899acc01b2eec334fe6fbbf9e100d8cc1431221cc97d5af7c6b52cbc601e6ab4c3b100002f6ff7e5d84", 0x91}], 0x3}, 0x3404c040) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r6) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) syncfs(r1) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:12 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./bus\x00', 0x4, 0x1, &(0x7f0000000140)=[{&(0x7f0000000580)="d8e07c4f7f6108d638a36d1e5546a1a5872499675ce6b49960521d579a56db8a80b34e2a9c52988e5a273668e56e37f52935111d803cd53e803591a8e3e94b64fbfbd2cefe3d5bbb4b7705a15f41923b897c47676dde770d1784625b41827bf7ea9d3fdc61ff63bb6666dd7c524bcd680ce720c3aeadfdc4ed72d983202b0cdaff42f2f6b7552b44272558ef91609195ab1af5abd7a51a695d62837b10998a875604dbd1f1687fbc70a1fb3243179fbe3dde0360c94653407867178529ce45b5f69fc7fad99cd6bf4a95f6644f56cb2d0b63f02661a5b3f37aee744c38a6d4f5129dd7fefbf542a26c7a40ab64f28f3b6c9ce61b3083094dad45300ea897c537f7c9b9a149e6c2ffe1b98213b190677e7e6bee44b6496726b43905d126b39424a2a4d7d3facf767871856ddf778dc6fd5946edf44a589ff5b90edb6b5e85e7af20671d8a115239fcce7374836195d662937c3d5b68aafe76e938aa54875a01304b960909ab800043a5ec33dec6934d42f8d1498b18720065b166e43b007f29475c4b72d9e356507e69d84635a581efa83be1c423ebf05f24240c4cc9e1a13fe1528df7c94044429f0b6566f3b97b79ce55324ee544ca086c1d022b90d1b8a92bba0e70dcf187fc4a1f4958f34c0682492005d6e2b1b82fc8b14facb0ad82a111dd91b9ef18da4a4242be2768007c4db41b9cd26725750579df1637670eff8ad7a933958ee2e6e1356d56658ed672d2652665242bd1bdb7562ad78f8d8146f46aa35514ca78a041c12a9e9ee03c21816e00fccf3f45d76389e48bec6eb2ff13952470bf72c35634b5e918850a43a50aaa7653d9d0be31eb4b68430d31567d87ae4210cbbcbd7080361a5656009b28008954e5fe65ef5f196196c244ce35a11ecef546fce6ddb0015b8de8cecaa93875537c6d68f216b895d0b4fb80291ff0e5eaa30eb0c26146abab9b29aeac0b73ddc95d99f465a8b7525a236dc0a8753572636c940fafe4a8866fd3fa7e7ddb9f21b613dbd11e89ef4ceabdf8cc791e59e0818b12fb8d37dcfc56ed093f3d103f184d2cd23c91943344a8a5c53938028b04a4b8f76ec3cfa432751bda487b7eadbec8b5ac945fd43626599d84dc8f5c1b27c905ed60fdc7a87c01ec203cdfe44d7400ce937b756f2c94bcb09eead7871016930cd8faca348779d00425375061413b7f310b8cf0f5cca3e1fa19272ea108dd027430f522b68030cc04ea57bec2bdfc061a315482052596357020287db3304da32d2cb9f83566d88ae704a1bb5cfc9e7714e33b463e7ca5ba6968542d4f91e896bb99f77a444fb56443287fe2bef5537967e16a186c5fbd94e3467e36070da4296066a29fe5a8fbf747574c863bc3776b34b61f2721e50e37d6b8357ffd05e67e0285b4b575da6db6c3032d71fa0e011c635035e67d960121633ad320df50206ada239b7cd5d7d34f0d0bb9f3b37b595ad707dcb38ed8114f78466b1a3428d978d6268985e6d18145a2f5772995df6548cedbcf11b5f7702e5198d1ea61855f529188839450ba6ed77ad807ea53d4c53130de4020403a0159e63c8c4550ec19e4b3c7996fd6d602103860a8fda0746e0368985bc6e06ed75ba39478d805b7289f5b2efccd2347e7c0d40e00649e359e4d9ffd6bfed098f0bd15d37254ba6f91c3e8d456ff9c73318fd3ef7397d25a3c5fe9946ab5ab2f9a1da7505ad55f46a39689329e2888ed96d7eb3a461a5f0796f80e5ecc92fffe0992b98b2581285a916db1309cfdd823419b20a482dfb8725863eb6a77ca6d0aaa21b1432d4c62dff8a52b1312962d29429d4b12e7df94bd1a7e03cf8843342831f6bdceb32f2826dfc6eee6b6c15b1448e44af7c346b956dfec53a844137532bc3e3e6f6e96827660f15ac96906eeb24e5e3890d6e22979d38b24ce1917c89562139db4100a7558797e289fa20fc472b01c342fb70bf20eb4cf9147266ea5fc309f9514f00519c83d73f0c895236f5d70c37cdf735c2679b7f633d7a46bf9b704975fbee58775b4c9ab269ac7a0864a69f4e24d23d496f5eec3ce74c44bcb40552ca9fa1d14a0af5cb08fdeb72136dcfb9e08ff0f1c935c4dbec7deb5a34d1f2306f713b7fa4aacaac325c85701f9d788f1965b47817dc7d1a651ed77db7a7eddaa0474d1d171a10814fde2e5bc19236eee4a3026ec42b5595f86952b7ff5eabe26e3ca48eeec38e67ae5a66f6eec3020784e0955eff2a091147c0e0ed8a6694b1e9c7f76c14ca0d4e172085dbaede2e87f426ce169a48392c4418fb0e79df0d4b2990bb1b6324ae3aeafc04befef9be5701f56a7c485cfb25085045230e8d5c229629f4aeb33cc868bf51acd0c402642d3950d3d85e47e100b4fc0d94b1adf8bc25c4dc9d4e285cb487eb66cf426678e7f7067a9395c3ae5f98a66ba08da87a350306f9273c0afdaa28a67e49b22ce518d8d51f8be890eb3c448eba5988f0d379f3280d814d3bcfca8ecc4abd9eb34e0f715f878552fe8fa4ac090c6289ae9949ec408af02f00f8aba7aa8ec134eac0eb19a770ba42bad00f2a8679891ebb440163ea4068532e64be29225beb46d8cc2a96029e4a7f58231f4d8b1396e6cf6c2d904738a7d4a830e4345180be7fbe7056bc31e5f2f33a403bf4ce9d3cbc498049ac36fb943499d29bdd75426dd10e08d20c480ea46734cc8e77d38047f172192a23fd385cfea6495a0373bc5ad4430ba0c2026e6034212b8da333a2d423ffc65814204a4bffc456f6ad5b8c7c8fe693ec453322ff34eb510f01798cd348a897b2c3381711f91d6b90e982c767f7b8ba3d77fe87a8582757e6beab1d68998536de6a17e561286c682a48cde0e14f500d1b37fa6dcfe8d8bb32f80912fa491efcc40b6fa80ee09f89421e488304c7203dd76ece7dd46f8dfd2582e3ff3b853a4d9b7abb88cab54885d8fd06089ce6ee75248154ec19ae27fa413c048c80bd49092babd17232e54a04556bd30b33245f5e758354bf408441b296030bcf48666d99209e095f0d0d03cb800a231a6edee33864fcbe95bfbf9a2fdb05303d31cc8cf0670ea0d6ed77f59c7ae8deca7f1b0379ae0ab94c377707c7911af45146c17904f578b97e732a316f42ae390f41b25287ca7ed246d49438f09b1fa85a065b8d31bd7cf04e9623e3264c0b06287bdd06ffa9b82da45f7ef44263e13eb5d5f553db40577cad4ae5109007486b7be16b0da2603f4de043b9096d2d164662a29f481c22d01497bbf8359d432e5ec86560c206e3ca76034dd29eff21e889f910bd316530ee67e5b9df5d2825dc012da1686a4316708a47615ba074da67a76f819dca68785c8ee629457de2891d76b22b43fb488a7b2366d53174feb06e783584e1bda94ab61e54ee517cfd5a4081dcf4332748a2c81eb391c7dd12e61683bc391a12e49c5f3d26f8ee1458490d512b841a88a79669acfb46459b14e9f5fc65a13e872119e5435120dfb7ebfbe2abb2d0f541cfc1275ebc61bd6a7d64014b65cb9b42ac33f17a667b6e66c4de0052063b04545f3df58ba4b5caf0619e1f9b5e29fde6211396f07a9305c84e55d79d998a2900f49d52b5dcd16c10ae333afb4f9fe12155c6907989e00800001a88a2b2f289232451560303cc9759449ebcab32110e0884ca1bd197fc6b3e2fd8a4afe1e0c9676eed3f66004dd12743e6c0e969c726af48bd3e55fb6fddc3cacda85898aee19ad5a062ba5ecf0200a0da922070fb3a30bf53ea23325764bab70cf8f17d0ca51f85180933e2b46c5ea2704e4fcd623e70b2b36e40d978ea4db60ffc2f20a3179f4765f14b56c510e855844d99e1d8cd23b45377ebefe09059f080bd013f8a009cfca47ea493d572925def07a1f4193e9e625dda766bb97578fa87972baa34aec3b798f2972a26058e41da0e4d93c2c804bb6deecc791cbb676b5a6cea0a792d77843bcce337f19acd59694a38e45b033df66d56c128f712cb535c7c4a3cf1f268fbd498d74e1e18f89b1fb2e2a90e7fcad0a151a49937afbd955fa4d5270f27fda23ce7c03106e0ad9201176a85e73494b7c659eca0e55e612e8c423cdac4c4d90f77fb1e99a4793ae0e1040afb37e70dcdb5b4fa6646f49f43df295a85e1cd312489c9fd7104e663dcaf86f2023a3e0a50737ffefdc21194747e717be125cc7187234da5b225196f181db75ba0be6d700793f4d7649c42f371630b0fb525d415ae2f86deb111658f0a5ef8f2861147a9d7b2b2d382e5526ffc9e60d496273077313a6c8e082396886f111b4354c457936006d61980183a6dd75f3b29c1ae4b7f9b251aea12cea7c0416146d28b48f04e91797f2e1417b986b93c150d19e9acc2ff1dcc0332d661802f54a7d205d8449eacfd4f0f52bc84edc69b61c91dbd62def8d63cf66a6428114bb4eb02ff24f55911393d625336cf3ef379aea0e4aee839220a8c26be1d060ca4698781dcbbf62a9faff1850e91a489557983c70d845b1b5f23b8b8c70da0393df07a6b7b93ea41fb405b61e9dc33164c815f78d2cb91ace79fd9703ccef9557b3567db3317c5153eb57939158fe8e42cc076500a924943107a5e439676ace3de03938c0aef6693699852b92625dc2c8c034075ff3b30dcc1d0f6a597ff43f4e04ade2e36c497f33aaf8b4606e2714c986b303be67c639f0961422ceea0f09ff224e91d028ec1ffc30310facaa31898410e62866c9bd5fcf3102e130386aa0765c0de091648780f20c99427bca85f6c17c6704216b49bfc279f847925684ad6c7d4e9058be5b22e4cd792a61315cb936bb89ef57c1c9c8984de2c6563fe0418983db2830be7dcde9678dba52dd0e8595910a3c483cf14e20f38874fa3179a3f99185c2cd58d4f3bccb0d851f076bb3588d2d5a16a93818c8ed3009c68da79d51753ebd55017505973417c8a659b3027e1cd6232a007f0d49d29d412ed8ecad9c520cb6187e19016f8d574b49a9b05e0c3076e296dc8109b1d3385c3ce1c99b8cc12f552a03d35914031cfe467a993b86351b6cf5403462f1678553d6b1041996a5fb6e0ea53fc6b32fe38b6c921a46202fd249e42d6a4602f49e1c21c203222f749f0f897a435adafa5e3b10855f6a6a5d695742056cfb9399d579c5b4330ce7d2309d5167e580bf30da904815fc61225f30eaaa3d7554d4357b1b574bad61cf4b29b2a3e6c6b3e03040c307d1d84cd54bd3acc6ca8badbfc628c0e8b8f6117bdf0f2b99cc85dc1ef4e37d9fc280550db0ad179da385c4801f9a732b6189806ea73d5c4c66ffc92c5bc4563d328097d4ec604d07438407263ff683aa77b97e481694f4eeea63290848eaed2b49208104348f7d8f5e30cff3ab19e4bc23ad433d14d62e9bd581a1bdb78957faff122d63a1b8bd81e41ea2d2129b20cb3510f0eeddb3cf9e7292874e49fb16acd53f47e59d0afc18333970ce58141df2d6615727596892f7da96a0e08820317f7e84cce2647bff023d880f78ea65b7ba04c5ad6f18404dc48b84a0a58b4d35e8ecc9fc929bd5ef0417a0d516d452a97b571ffb8370f00013965d7185064528c688d53272b674907b604595e4e21170fc72714fa8e22b65114e4b7dba5809a38b6eaeb78de2e43197e28b4855163b76d32470ecd35b4005d5f9c66a91fa4afba4881ac03cf896941e162e97170e221a961d740a1bb014910c85116e6fb3fa4960b8fc4f0f5352dc30e039831c90bce41fa4ed1a128af75cd56452ec9a003038eb27d705d16b6eedd8d3ed498eeec04fe4a29d64a3a25e0dbef6e9b5d7eadb42797e378f0cc501", 0x1000, 0x6}], 0x0, &(0x7f0000000180)='\x00') mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r5, 0xc038563c, &(0x7f0000000140)={0x1, 0x0, {0x29bb, 0x1, 0x9, 0x9}}) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f0000000340), 0x41395527) dup(r9) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r10, &(0x7f0000000400)=[{&(0x7f0000000500)}], 0x1, 0x6) r11 = dup3(r9, r10, 0x80000) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[@ANYBLOB="48000000100005070000b736111add030056c8c6", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES16, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e0023b398d59bfd71fd3fe6628c3d48ed3dd65587aa63df05003446202caef5f1425088e05a652efde90b739c3529cff3b36ec26ef1fe75caf3cc0e5a6ef6900a50ead78a32b3138c1d6cf9762405a2abb138b571dd3dc7344be3d9e5e059a9e203df9516547dd5f4c6bb14b492c9fb293f17a1245b390871e9b11e1982e4378bdad44f1f9bc7c7e0248238d095982ae63c255ec96c335fd95cea39f0f3311f8e7f51b07cb665fba436397c4e7328805362071590"], 0x5}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r12, 0x407, 0x0) write(r12, &(0x7f0000000340), 0x41395527) dup(r12) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r12, 0x2405, r3) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="2400000024000100"/20, @ANYRES32=r8, @ANYBLOB="00000000000000000000000084a0b4eb0163810e010c498e2b8d3ba4a8f944169e62043d296dbd0264ac8c5a387427a45ead48b3a3c9bef0eead2c5adc8841c1b9eb0ac133e24ff0e3e5"], 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000080)={'vcan0\x00', r8}) 13:56:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x49, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x58, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x100, @remote, 0x7}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffc01}, @in={0x2, 0x4e24, @empty}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000200)={r2, 0x7}, &(0x7f0000000240)=0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:12 executing program 0: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="619289949e75928cfbd192d991bdb6f7ded0f1dbc7ddb4046a0e361ab7ce93f2f20516ba49324a468f4e4338f3b444a6e0268a348f267a10373db6bd26629b97476dc7f9a7c7b55e2c1fa9205ec7c93b9fee6e5a712f74d1942af50300000063"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$sock(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000240)="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", 0xfe}, {&(0x7f0000000040)="5f6abe8986f03c23a5969699d09e8b8a1a3bf8dc09707decbaffd98b7e2aa64a7801cb6e794c5d99a75fcb50b8c9800a81947062d2cb69fa45c3fba5cf8dd0c4d8", 0x41}, {&(0x7f0000000140)="fef1bdb4e7cdbf04b6fe3b41d02f3caf3168eef17206f26fd7328ee048a7179e17d393628c930ec867c9051ede006164085e4e83fd1cb23992738fc4d8251bc21ff37022cec63aa61fbb4c5c2ab3b335f6a079772a3ee778f4d1fc278ff33ef1b9b1ec172f80418899acc01b2eec334fe6fbbf9e100d8cc1431221cc97d5af7c6b52cbc601e6ab4c3b100002f6ff7e5d84", 0x91}], 0x3}, 0x3404c040) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/policy\x00', 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r6) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:12 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="533f4be38b84368ef8ee75072adf24e7ed055fa18e0ae49443de5405fa60bf3b959e3f2b56bad42e7ddd5f66232266eac9aa05a611c5fe0abfbb2090421d21f65cdddcac12396e6a7e49de1690d2ce58bf7a968abd8035987c624b7830a7848ccf85924c0346eb434a4e9aa00d"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:12 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r1, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x6, 0x2, 0x20}}, 0x30) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fcntl$setstatus(r3, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:12 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:12 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:12 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x6800008, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="a195005b28d20c35745b9975a846ad0ec7bb53d79d1aa55345fd826400100000f0665142fe0ff4ce6e85b933fd80c6a1b9efc83346892344"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)) io_setup(0x0, &(0x7f0000000080)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:12 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:13 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x400, 0x40) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x1800002, 0x20012, r1, 0xfffffffffffffffe) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) fcntl$setstatus(r3, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000080)=0x4) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@gettclass={0x24, 0x2a, 0x52d, 0x0, 0x0, {0x0, r7, {}, {0x0, 0xf0ffff}}}, 0x24}}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x109000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000200)}], 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x10200, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt(r4, 0xdd, 0xc6, &(0x7f0000000380)="1192f28666f19e5d8e9a11ec27b99e7a91bae0f5931ebfa9d8607ea4a15a20717fe043a79bc81a43eb95f20decde59b6668b4bda220a7f0497ed2d70f330df3cc2a928b0aa5d61bec73c4cd593f82dcfebd790228505eacb2ef1e2c78deeea86b26490c073b4feaa59794052f851accadefc47663278eb731a3d5bac3e94759dbf02ea8ab2f1b24136e3b46f2beb066485e55182cf1276a2c456854700bc3f4195508554cd9c647e47f22662851b58f3f63c16fab375b81874dc8c4adcd91cad503b93168ba6298da3d0c2618db07db2c339247d548c13ff9bb8901f2a974bc40b9aa60554dce3b500b8", 0xea) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x400000, 0x0) socketpair(0x8, 0x6, 0x3, &(0x7f0000002700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000002800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f00000027c0)={&(0x7f0000002740)={0x44, r1, 0x0, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r5}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x4398c2c6860c15c6) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 345.840840] net_ratelimit: 16 callbacks suppressed [ 345.840922] protocol 88fb is buggy, dev hsr_slave_0 [ 345.851488] protocol 88fb is buggy, dev hsr_slave_1 13:56:13 executing program 0: mkdir(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:13 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:14 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="5d0a4c9df5a31966867e7fbba4073afcde7ec7ea7a44f69809068a012d63351c88315ebcf63107c60e8bcc26b8198ebbbd14361d5d808da9f829f289752f81dca10cb4c8ac9116ebbfa70245c9676cce3c50a1ec214de7687de4086f00"/105], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r6, 0x0, &(0x7f0000000540)) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) [ 346.390148] protocol 88fb is buggy, dev hsr_slave_0 [ 346.395378] protocol 88fb is buggy, dev hsr_slave_1 13:56:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = dup(r2) accept4$unix(r3, &(0x7f0000000c00)=@abs, &(0x7f00000001c0)=0x6e, 0x80000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$KVM_SET_XSAVE(r5, 0x5000aea5, &(0x7f0000000380)={"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"}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$uinput_user_dev(r6, &(0x7f0000000780)={'syz0\x00', {0xd21f, 0xffc0, 0x2, 0xbe2}, 0x27, [0x55c, 0x7, 0xfc48, 0x4, 0x6, 0x3, 0x9, 0x8, 0x6c, 0x1ff, 0x8, 0x0, 0xdc822768, 0x0, 0x1, 0x9, 0x101, 0x1, 0x9, 0x0, 0x5, 0x1ff, 0x6320500a, 0x3, 0xffffff65, 0x5c, 0x0, 0x4, 0x880e, 0x10001, 0x80000001, 0x1, 0x3, 0xffffffc0, 0x5b, 0x800, 0xffff824c, 0x10000, 0x9, 0x4, 0x9, 0x6, 0x1ff, 0x5, 0x7, 0x3, 0x4, 0x2c76, 0xfffffffd, 0x80000000, 0x5, 0x8, 0x4, 0x4, 0x101, 0x38f, 0x2, 0x6, 0x5345, 0x263cbb25, 0x8, 0x800, 0x5dd6, 0x3], [0x1, 0x2, 0x9, 0x4, 0x9, 0x7, 0x8, 0x8, 0x3ff, 0x3ff, 0x7, 0x3f, 0x40, 0x6, 0x8001, 0x101, 0x1f1, 0x3, 0x20, 0x9, 0x2, 0x20, 0x8, 0x5, 0xffff, 0xd2a, 0x0, 0x2a, 0x3, 0xa78, 0x7, 0x0, 0xfffffa67, 0x2876, 0x5, 0xfff, 0x39, 0x7, 0x80000001, 0x1000, 0x8, 0x5, 0x6f8e, 0x1, 0x3, 0x8, 0x0, 0x5, 0x684, 0x200, 0x16, 0x1, 0x7, 0xfffffffe, 0x1, 0x5, 0x4, 0x10000, 0x7fffffff, 0x6, 0x0, 0x4, 0x2, 0x80000001], [0x177f1795, 0x2, 0x80, 0x8, 0x4, 0x7ff, 0xb6, 0x79, 0x867, 0xffffff55, 0x7ff, 0x7, 0xf20, 0x101, 0x3, 0x4, 0x1, 0x10000, 0x7, 0x8, 0x8, 0xfffffa2e, 0x2, 0x3, 0x5, 0x8000, 0x0, 0x8001, 0x60, 0x3, 0x10000, 0x296, 0x7, 0xffff, 0x40, 0x1, 0x7ff, 0x4, 0x6, 0x5, 0x10000, 0x1f, 0x2, 0x1f, 0x2, 0x2, 0x401, 0x0, 0x5, 0xfffffff9, 0x40, 0x5, 0x8a, 0xfffffe00, 0x9, 0x1, 0x2, 0x1, 0x5, 0x7f, 0xc0000000, 0x1, 0x9d31, 0x6], [0x7fff, 0x9, 0x3ff, 0x5, 0x0, 0x6, 0x200, 0x7, 0x100, 0x2, 0x6, 0x1, 0x80, 0x6, 0x2, 0x4, 0x8, 0x1, 0x2, 0x0, 0x2, 0x5, 0x8, 0x6, 0xdb, 0x101, 0x6, 0x2, 0x1, 0x9, 0x3, 0x3ee, 0x80000001, 0x8, 0x3, 0x8000, 0x4, 0x8, 0xf0000000, 0x8001, 0x74168e5, 0x8, 0x6, 0x7, 0xff, 0x1f, 0x7, 0xfff, 0x1, 0x0, 0xfff, 0x8, 0x0, 0x5, 0x8, 0xffffffe5, 0x3, 0x2, 0x1, 0x7, 0x3, 0xbd, 0x6, 0x4]}, 0x45c) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:56:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000080)=0x4) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000848aaf2f6eb2993a15a8ec45991c100e1817086f00eb35e70a1ad0d362b47b8c8ff683a2d82e0cf4df0b8c4cb48360dc0b8cb043599c9c4f504e0fa4e7a34d1f70f46ea1e1024632d140980dc29eeff367ec3e89f4a4c20de9609e37f2f84b0d398c27cbd8043c113a7b335e322c5ac0bd6cdc3bf3bfc863823d12b4a809c33b8639d7e3267c909fb647903296de60d3339ef0191106e0691a792ad9dfe644c6cc55acf4702e2149cf37744b7146dd4f70148779a55ac648323648c6fd0f39d07e3d5d936f0b95a5"], 0x48}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@gettclass={0x24, 0x2a, 0x52d, 0x0, 0x0, {0x0, r7, {}, {0x0, 0xf0ffff}}}, 0x24}}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)={0x1, 0x1, 0x8, 0x2, 0x11}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:14 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x20100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x13f, 0x1}}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:14 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:14 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 346.880360] protocol 88fb is buggy, dev hsr_slave_0 [ 346.886083] protocol 88fb is buggy, dev hsr_slave_1 [ 346.950588] protocol 88fb is buggy, dev hsr_slave_0 [ 346.956095] protocol 88fb is buggy, dev hsr_slave_1 13:56:14 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000500)='/dev/admmidi#\x00', 0x579, 0x210301) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000540), &(0x7f0000000580)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xdb459a1b689a74c2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 347.110117] protocol 88fb is buggy, dev hsr_slave_0 [ 347.115253] protocol 88fb is buggy, dev hsr_slave_1 13:56:14 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x4400) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f00000000c0)={0x9, 0x5, 0x1f, 0x2, 0x30, 0x7}) 13:56:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f0000000140)={0x692, 0x100}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:56:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x1}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80) getsockopt$netlink(r3, 0x10e, 0x8, &(0x7f0000000200)=""/165, &(0x7f0000000140)=0xa5) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) 13:56:15 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 347.532224] kvm [14972]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 [ 347.540670] kvm [14972]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 [ 347.548819] kvm [14972]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000a [ 347.557634] kvm [14972]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000c [ 347.565737] kvm [14972]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000e [ 347.574277] kvm [14972]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 [ 347.582348] kvm [14972]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 13:56:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb], 0x4000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfc, 0x400000}, 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x55, 0x7d, 0x1, {0x0, 0x4e, 0x20, 0x6, {0x20, 0x1, 0x4}, 0x90000000, 0x101, 0x5, 0x7, 0x9, '/dev/kvm\x00', 0x9, '/dev/kvm\x00', 0x8, '&+(ppp1!', 0x1, ':'}}, 0x55) 13:56:15 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:15 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, 0x0, 0x10a000d02) [ 347.774218] kvm [14984]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 [ 347.814758] kvm [14984]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 [ 347.833415] kvm [14984]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000a 13:56:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$l2tp(0x18, 0x1, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{}, {}, {}, {0x0}]}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, r6, {0x0, 0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vcan0\x00', r6}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@mcast2, r7}, 0x14) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000100)={r2, 0x2}) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 347.946181] kvm [15003]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x4000001f data 0xda000000c3fe 13:56:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) fcntl$getownex(r1, 0x10, &(0x7f0000000400)={0x0, 0x0}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) perf_event_open(&(0x7f0000000380)={0x53d431717a8bbaf1, 0x70, 0x0, 0x5, 0x14, 0x80, 0x0, 0x6, 0xa2b10, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x4200, 0x96d, 0x917b, 0x6, 0x7fff, 0x1000, 0x3}, r2, 0xe, r3, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x35e, &(0x7f0000000640)=[{&(0x7f00000000c0)="86000081d53dfb556b5b4286f4e52f89184d7259fdbd285903009880e1de1a8103686128da74c933"}, {&(0x7f0000000100)="5b07adfc3bf7bd6bde7042cee89ae9b13a725c7809d00eb34e439d4be67b916cfad459a0fe1fca4304584e94556c12f3fa71ccdac89f5a5c2ca8f06dfee92bb99fc1373d26"}, {0xfffffffffffffffd}, {&(0x7f0000000480)="e5e06f84f9b9474413137a8e408449f82be4021b1a06a7ed9ed1bd632290c65ccbb518ce12e8bf72d826a4cc616b65adff49d830a9fc0fa15165e146ebfe69c622b93787048cbbf8e8448a34f8272724b59b089ce507ff1877290b5a534edba0d023eed4d035878943e03083367610af6fad9ead5eba79b46b40acba510fd0f8d060b62917057c44b137c4d5c194737ea3a218c18840c49ee6c5d511caa5985f9b63277c854d958e361d188d3a779f5c87beaa1639fce6e035634fe0347f42615cf95b6fec8927d5adb2fa053acaabf8377f7107be52316271451aac7542e19c617de9fa8310252cbbd30214f165"}, {&(0x7f0000000200)="a53e77f48d9d243658958eb2e758495930c1cca54a0caabd98a637f276e1a4272b0c1722031dbfe8efc69cb6c66817790022fe718662e9749c8ee6bc021d5edcad9328501651209bb39b6d00cafcb4e94fc6769a7d0e54fc5913de82e2bbd5a593fb"}, {&(0x7f0000000580)="756d335ba1033ec836db72f938548261996c134c83ac5973191ea42971822a3c477a84b4ad0b4cd5d06cdb179d0bac47e532542d77e9e1d5769d1a4af83a8a613038d5db9662e442e66760b2d21e0bb9c81fcc0e4d06e752b94f8a51ca7c30b4eee4010f14c4e9369faf09be05705765519244b2d07fa74597afc671cae74e3c034e9d36c5a44f23de54b59828854187c0ec7c8178a368437d47e151e44f8f"}], 0x0, 0x0, 0xfffffffffffffd25}, 0x4000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:16 executing program 2: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x200000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000140)={0xae, 0x8, 0xecec, 'queue1\x00', 0x4}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x0, 0x3]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x1e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r4, 0x80386433, &(0x7f0000000380)=""/201) 13:56:16 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x10003, 0x0, 0x5000, 0x2000, &(0x7f0000048000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, 0x0, 0x10a000d02) 13:56:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000180)={0x800, 0x8}) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000080), &(0x7f0000000140)=0x4) r4 = socket$bt_hidp(0x1f, 0x3, 0x6) pread64(r4, &(0x7f0000000380)=""/4096, 0x1000, 0xdc) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:16 executing program 0: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x300, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)=""/100, 0x64}, {&(0x7f0000000100)=""/48, 0x30}, {&(0x7f0000000380)=""/249, 0xf9}, {&(0x7f0000000200)=""/175, 0xaf}, {&(0x7f0000000140)=""/48, 0x30}, {&(0x7f0000000480)=""/254, 0xfe}], 0x6}, 0x10140) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000640)={0xaa, 0xa1}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) accept(r2, &(0x7f0000000680)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000700)=0x80) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:16 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="6aec54cf7ad4351614bbb7f542e42e8814d1c2d7e0877bde2c97631b6b3c0c55ad30dc7267acdae3a1162c695e931edf6a79649ba472e5aff47bc1f908732f11b2068f9efdaf778fd3b78ef53b7b52a33c7fff63e1ebb7bad67cd2008461905db3abe3ed44ca937753a2407643cc751b673d620812cae6e469dd2f1037a3"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080)=0x7f, 0x4) close(r3) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) listxattr(&(0x7f0000000040)='./bus\x00', &(0x7f0000000580)=""/4096, 0x1000) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) [ 349.259732] kauditd_printk_skb: 66 callbacks suppressed [ 349.259741] audit: type=1804 audit(1569765376.934:1112): pid=15064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/211/bus" dev="sda1" ino=17354 res=1 [ 349.315064] audit: type=1804 audit(1569765376.984:1113): pid=15064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/211/bus" dev="sda1" ino=17354 res=1 [ 349.346926] audit: type=1804 audit(1569765376.984:1114): pid=15064 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/211/bus" dev="sda1" ino=17354 res=1 13:56:17 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, 0x0, 0x10a000d02) 13:56:17 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:17 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x200000000, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000380)={0xe9, ""/233}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000080)={0xa2cf, 0x1, 0x6, 0x5, 0x8, 0x4}) 13:56:17 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:17 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:17 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff}, 0x0, 0x0, 0x2, 0x5, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f00000000c0)=0x9) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000100)={0x8, 0x1, {0x3, 0x2, 0xb61, 0x43581ab03539060f, 0x76b}}) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) r3 = shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000280)=""/7) sendto$llc(r0, &(0x7f0000000200)="aa6e2d1145d04c22d7f28ff6901100b11b9468a5b2959e3a47732e2a2b0295b3cdbd", 0x22, 0x20040804, &(0x7f0000000240)={0x1a, 0x337, 0x9, 0x9, 0x40}, 0x10) 13:56:18 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0), 0x10a000d02) 13:56:18 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xfff, 0x280500) r3 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x5, 0x48000) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f00000003c0)={[{0x5, 0x8, 0x0, 0x1, 0x2, 0x9, 0xfb, 0x6, 0x7f, 0x80, 0x4, 0x8, 0x1}, {0x6, 0x5, 0x4, 0x9, 0x86, 0x3f, 0x5, 0x8, 0x7f, 0x6, 0x9, 0x7, 0x1ff}, {0x7, 0x0, 0x7f, 0x1, 0x1, 0x5, 0xff, 0xce, 0x1, 0xc0, 0x8, 0x3f, 0x2}], 0x1}) sendto$llc(r2, &(0x7f0000000140)="ec1e893dab7fdf8d34cc605615a9377a66df19edfb0514f6f44b8ec274d4040ae078cceae5eeb572583b520990cdb3d0abec0c545ae47c269b5feab0c97cfa3ed094f76b48fa94c2773892727f397b33817d168d77e12ba1dac577afad704805a2c41a849ff6817b287d5be0802f5c0e9deefecb2d39818fadc51de9e23b5fd5d723936ef1d492dda2f2f3eef8b091a890901c9771a320a80e17baa96be1f5ab89d4c4ddf19d", 0xa6, 0x0, &(0x7f0000000240)={0x1a, 0x304, 0xd7, 0xd8, 0x0, 0xe6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:56:18 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:18 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$selinux_user(r2, &(0x7f0000000140)={'system_u:object_r:auditd_log_t:s0', 0x20, 'root\x00'}, 0x27) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000080)={0x1, 0x1f, 0xfff, 0x2, 0x2}) [ 350.786107] kvm [15141]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x5ce22 [ 350.819996] kvm [15141]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 13:56:18 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = getpgid(0xffffffffffffffff) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) kcmp(r1, r2, 0x4, r0, r3) r4 = socket$rds(0x15, 0x5, 0x0) setsockopt$sock_void(r4, 0x1, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x26b47a007f3c1d3e) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000380)=ANY=[@ANYBLOB="0200000080abec87d1defecb8e7666c115a45cfe4799baa29d7e000000001d6eb30f18908bfc6a702f1f41d46940fc1f7004a59e5a1e7f01000080451d7873d728da771f2588146ad080425e2d0ae3a6ba72b17ddf5d02703968547705cf50d828391a5a315c03c765f79cdd4222b08e2da27c66473de8fbbcfc45fb45f1413a3400e65d92221ce8ee911c6e", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x66, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000140)={r7, 0x1ffe, 0x80, 0x80}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 351.030140] net_ratelimit: 14 callbacks suppressed [ 351.030147] protocol 88fb is buggy, dev hsr_slave_0 [ 351.040283] protocol 88fb is buggy, dev hsr_slave_1 13:56:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) write(0xffffffffffffffff, &(0x7f00000003c0)="860540abb9e0636e5a916faeab27093faaca53c208bd891583110f1a0892f914939ed707b9f13c63c05bce63c3039f0af61dee927dcf9222a6511bc855cd12abe5b83992c94fe166c33bf31489eaaa629957dd20b1945b4b5944fdf1032b11a91730ba59bc0805d87094b2cb689598553845a71212c0fc5e8019a5be0856cd8e1325c00f52de26f25d204560cfac3b5657411bac023baf3b399067b991ae1f22e4aa2867d0c83a669fc35e9a254635dfcdae443c9ed9b579d210a741b474e335afe407144712b4e7c27f37cdb416638422e1e159f3a7c91fa311f8b2e7ff18c9", 0xe0) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x8040) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = semget$private(0x0, 0x1, 0x800) semctl$GETPID(r4, 0x0, 0xb, &(0x7f0000000140)=""/116) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 351.111193] protocol 88fb is buggy, dev hsr_slave_0 [ 351.116904] protocol 88fb is buggy, dev hsr_slave_1 13:56:18 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0), 0x10a000d02) [ 351.270334] protocol 88fb is buggy, dev hsr_slave_0 [ 351.275529] protocol 88fb is buggy, dev hsr_slave_1 13:56:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:19 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:19 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000380)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x16422, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:19 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0), 0x10a000d02) [ 352.070761] protocol 88fb is buggy, dev hsr_slave_0 [ 352.076227] protocol 88fb is buggy, dev hsr_slave_1 13:56:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1000, 0x0) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:19 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:19 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000140)={[0x4, 0x3, 0x5, 0x5, 0x0, 0x9, 0x8, 0x2, 0x9, 0x2, 0x9, 0xa9f, 0x6, 0x3f, 0xfb1a, 0x6], 0x2, 0x140000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40000, 0x0) recvfrom(r1, &(0x7f00000000c0)=""/70, 0x46, 0x3000, &(0x7f0000000200)=@un=@abs={0x62c5d9980f999ef1, 0x0, 0x4e23}, 0x80) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000380)) 13:56:20 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 352.398524] Unknown ioctl 8838 [ 352.521183] Unknown ioctl 8838 13:56:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r4, 0x9}, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000003c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) dup(r4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r4, 0x4}, 0x10) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = socket$inet(0x2, 0x4000000805, 0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = dup3(r6, r7, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000001c0)={r9, 0x9}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000380)={r10, 0xd6, 0x9, [0x710, 0x5, 0x5cbb, 0x6, 0x101, 0x40, 0xfff, 0x1, 0x9e]}, 0x1a) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000080)={0x6, 0x6, 0x7f, 0x6, 0x8, 0x1, 0x9, 0x8c, 0x6, 0x7}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 352.630163] protocol 88fb is buggy, dev hsr_slave_0 [ 352.635306] protocol 88fb is buggy, dev hsr_slave_1 13:56:20 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x0) 13:56:20 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:20 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40000, 0x0) recvfrom(r1, &(0x7f00000000c0)=""/70, 0x46, 0x3000, &(0x7f0000000200)=@un=@abs={0x62c5d9980f999ef1, 0x0, 0x4e23}, 0x80) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000380)) [ 353.473899] Unknown ioctl 8838 13:56:21 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 353.643977] kvm_hv_get_msr: 48 callbacks suppressed [ 353.643987] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 [ 353.697192] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 13:56:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x0) [ 353.762900] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 [ 353.826719] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 [ 353.907750] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 13:56:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0x0, 0x5}, 0x18) open(&(0x7f0000000080)='./file0\x00', 0x1, 0x0) [ 353.949694] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 13:56:21 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 354.005754] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 [ 354.064167] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 13:56:21 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 354.107525] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 [ 354.143726] kvm [15297]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000004 13:56:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) exit_group(0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r4, 0x0, 0x8, &(0x7f0000000080)='keyring\x00', 0xffffffffffffffff}, 0x30) ioprio_set$pid(0x2, r5, 0x87) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) write$selinux_create(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x51) chmod(&(0x7f00000000c0)='./file0\x00', 0x100) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) io_setup(0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:22 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x0) 13:56:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000100)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) write$FUSE_LSEEK(r1, &(0x7f00000000c0)={0x18, 0x0, 0x5}, 0x18) open(&(0x7f0000000080)='./file0\x00', 0x1, 0x0) 13:56:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000480)=[{0xff, 0xd4, 0x81, 0x0, @time={0x77359400}, {0x0, 0x89}, {0x2, 0x1f}, @ext={0x79, &(0x7f0000000080)="fc1b3968f28ecbc1afe91952b36e3d62e730c21acf47124da463eab92be26f3b6674d8ae4efa88895ea5ed92c6ae4d51e9d3e6d84634bd42c981c1d8e5f6b3a8321c0b049b90290f83bf5a6fc9320fb55e36a9b74bd78c39842e8862a3f1fd974fd79ace928fa33eaae1dc2a90c763c889d6589a99019bac21"}}, {0x2, 0x6, 0x40, 0x1, @tick=0x9, {0x5}, {0x7a}, @queue={0x20, {0xffff4016, 0x40}}}, {0x2, 0x1c, 0x1, 0x3, @tick, {0x1, 0x4}, {0x40, 0xfb}, @control={0xe5, 0x1ff, 0x80000000}}, {0x6, 0x7f, 0x20, 0x1, @tick=0x9, {0x0, 0x2}, {0x1, 0x5}, @raw32={[0xbab, 0x2, 0x9]}}, {0x0, 0x3, 0x3, 0x1, @time={r2, r3+10000000}, {0x3, 0x4a}, {0x3, 0x53}, @control={0x7, 0x5, 0x3}}, {0x7f, 0x8, 0x8, 0x8, @time={0x77359400}, {0xbb}, {0x0, 0x1f}, @result={0x10001, 0x7}}, {0x0, 0x3, 0x8, 0xff, @time, {0xf9, 0xe6}, {0x8, 0x1}, @result={0x7, 0xd7c}}, {0x79, 0x3f, 0x7, 0x9, @tick=0xffff, {0x4, 0x40}, {0x0, 0x1}, @ext={0xcd, &(0x7f0000000380)="b67309f80d165300ef73d97c49fde34cdd3c8f6182f1d42659b1a6123709b12292868ac4c2bf5f05ad74a9677e553c22a285ae07746d9bba457238b47c68fde13a39850883f712166736bf8e32369ab64020f67c3cb65b961edef1c476d4042e3b7ad5aa02dfa5337037c42ee554657265c89e6b5384f0d72f2e1f300abc5e260d7bd8a1fdaf43099d8e497fb33b2b5c37901765c2f45e1e3b6a2dd2f29722647f086474da8dfad977411ada0a4fb72e04cfbd92a5d50a06844a0fc33d856509560c75e61d69f9bada3bfe916a"}}], 0x180) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) setsockopt$inet_tcp_int(r8, 0x6, 0x0, &(0x7f0000000240), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000200)='./file1\x00', 0xffffffffffffff08, 0x5, &(0x7f0000000740)=[{&(0x7f0000000800)="7f9dd09318bb27dc3b624fe8b8c10cdfc3bf6c69a28bcde9f16a26d6258ac8caa0bbc17d216d29f96cfdb599aa3b32dff7ce96f08f2e6edddf38a3903c0e3d32ba171fa8bdc59ec909194a4ac5b9f8b78ae99b4fea5c0dde9799f8515d9294bfb420f556e863147732b390ed89dbda94d30e08a72bac51d165fe116e11897f65dfe7547e23102d67145e79f893e1c7196f899a06e6703203e696443bdc6a69bd18", 0xa1, 0x6}, {&(0x7f00000008c0)="49c307edf94cded61e37c66fa6b57a7afeec8e5cf96e1a2b9d0d5eec8e9b0b1865b3e37bb4971218d0fd3cbcba8e86b6f216af6d38b98eb34a1e94d99641ee78973f7a0f983f771d66906a95633f1517fe9864bfcfe2a2b4f352625f07137f64f0f45ce467c15644d564e0e64a0ab67545ef4a0327f0c5bd30bd92cae3896ebc02838c31ac842e61ac4e34f301952ebdf3bd0ee4ed4f09f73c8e2667050f148539", 0xa1, 0x5}, {&(0x7f0000001340)="2dbdea8c4308e045f54fcbdf1302584e103ccfea4a94609cf0066bfb600ddc91ace8d95805f90016b1da45d49ec0275a49c91bb2eb12f1098b92a83add46e51cb47a8e5eac474c13b501bd17623e88518f56455bb7ee5d6d9298bb49f16403cbf9961dc6d4a11240f8a32e08683ad05c4fb9f47c28482a24da89cafbc943f694e76b24f29f8b381a68da6bba79f89c4b4e41ebb84d8f8aa761fb58c0a2dd54aa4bfd30f64ee7a81defc6edcd5732007a52a8e8a877dc214552f14a35c86f6cedf813dd95ef7e26e257be9425399b4aa091663fc40cbdb5808cd08fb866490446e448b8cf75a5f416e750f8c603b699d6a61842a4bc16c8582b2b37e513716d40997ed203b93f1ec3a472afc9255c796c02c0d5a6b41f434395dd078debf3c618bb79df5ab83385cbc2c62cf5c42aae9852290a4781ff65fecc4b8581077db7f6f13a594920c9f229ac1ccfb7770f00fc3c5c3753fd7551665d00c7761019c871eddf40a1699586f665e3f54ddeb01924c14f7f81da4bd4c6d1e52c0ae3fc0ddf65f7e4a0cefaae2936489a537b2f23dee9668f341f06a09693616d4d82926726e655285ceb507620eb9dd8c32a60f69b64750a3ba4f1316c24dcc03aab2e503741c24e9d23f2da0dd4aeebb84ff30d794ce5a279a108e3dac6d3732b37526c48dc4e20cd4ac2b0cc2ffa084947199322dabedff9beed3c3491f7e9373d201c29403c7c81bad31560bcebfa1a87c864bfa2f886e5821d30131f88da71206931de4de80bdf5d2a65328d9905f753a92383ab865d68c975360858f373b02426d7fccc462ba0763ff3220cb039d48bffba461c5840685ea603a0b2dcad8ab046412db927e97a5bddbb46b629dfdb796968d9aebcca8b36c93176fdd0df555bbb42c50d9ba8847adb6286a117b9cbcb0a5657a881a9d0b2c0033abbde827899604cd75877c43b7c6c1a56985079cf8b0ae4f77c2bb1df4a48be08b8a7e7ca282e2bef32813bdfddb732290f52e528747c8ba0f1353f76e64d17b4979eaab5fc4687f4e571d74104d9224cb4318dec24d49eba89c8076e5dd46911c788bbab279cc3df200ab42de0660a2bfa7fc441693e9a6ed128e4f45edc1868520720c389f4b65cd2808d7563a9ff88d1b4ae140c6a0ac3458cac179d12aaf1031d516b4157ef08cc6355d20ebd8b1e5950b97667bdfc7d150febe7b63f981f4e44954d45f83f53c5ee5bf9a87d6aa71262a5d2e629b343ee8fcd9e9a9f205024bdb7cbce408123528e1783bfbc95f43d29c6a380095394ee17e22a84e0d92ed12698c1488300479101cbca99a4e9af568b95fa88995d89348fcbc1b1cdd2775660c789e8547cd1d7bdcd1a75d03e24ecaef4c57a4152ed3fb103152bb27e030e3c5dc824825bf198d6d50d7095764dfd31f125e51f24715a74a6f648a46fb5ad217f107f8cfa840fb124f2bfd3f455afa04ce50b1d3828542b46591f12d32f08bbb9706fba76db301fc507e638e9ed163dc070b6966d024175f92e7d4784c65b44e0e56678b3e711655af6da4ddfdaec0c669985d57ac9c6ab5c13c04af11d154388f79683e73cba9291a6bacc9f550a495e1d15aab7e14b4bd4de16d9908930ecd3c53c1808002bf96e2ac8ffd2ade929b50a74f2c42ca9b0f6e1f8f5c5ede7b0d9eac9570520da19b759697703e6de0afb23c003c91da0d16a29709c459c8b04154640c9c716b01d0a279f6c1489a1363b40f3512d2b8da14904e3a6473bf5cb045081bd075f88e7367df08d381f1ac80728d37bd9047241a688ce74cf322c7faa8b8631f77de91faf226262fa080627f10a1b638377b0c0916f3a7ddcadfc966a7414370c6aaa8f0a2410513be382ede42dedfb5b67106f96ac55fded808bc1f3bcb73e8b537319b6fe089f9438f8e93104b905333caf19d3b7cb445ea663a7b78d3549b49ad47ad93d7aca75ec9cda84f23631f2b8649e86ef82d334f25c2a0ce811cc068a62d9c138881661623ede00e03046db4d8dd7110b3d73f1d5cb3b95f76164fb9090ff83059f84141e3ea12641a8c6d51b2fc6016e980296512b7357401bff568f0cfccb12a7db4458ff31d7fc70f40cb6a57dbca5c6bfbc384758020a8175747fb9a52508c0799a8464bc6e8459d451f6776b11ba5dcabb0945b28a50abd4c36b063d0b402db82325bec27a3224e3ba2b0db4e161f035da5168cdb0d95e97345a357eda063f79a2c85bf15ce4b666244b1bada535d78e554a1fdfb609af48ecf33ee67d0741cc4beab27de6d8dcdcb0e6c7190fffa37755415a77f9b091b48a43eed40b938bc0990e46af8dc3aa6d7109c61bd3f94f4ef97da8554af4acac0d23d82aa66d276bc04b301c9bc37f7fce48ff5b073e7f0cdcbca71ec36759e32dedb3e7ceeb581c4edde131d41accdc2ec23cec13434f91a12962c699bdc48f028fadc06cbb3a3757a09a8a916dead3e1a1dae0dae1eb38647445d3f7131578f437b014a884a4986da662fc6276fd45a21e30b0861dfe856682343ea738dc5ff42c0f2ec47a3161b0991440d64a5375f1633c70677cdd7254af2ad408bbfbecfa6a4917dc80cd04be7b87a40ea42a8bc3c2fc7e82bead86b497935f41dda1bdc6ac32522b96c20fae6f1327088984894d5e34e56e4c7b11ff77695c086d09d3599906773c72619d7f5c684b821413142c3a047f434610676d95a4b024a1fab7d81c98d140e44a8b317c6b8c8337ef07141e936fd7fc6b14ec4c0c23d953010bd24262b6590fde1345d4a5d8237d6c8c20dd06879f9a30b7c3b18499bf0a638077023d162a8e0dc47d3d03e6b8cfeeb748672e33b0ee8f6f29b3cba772a339f15d437a9b1863f74d9ba35346b3285af1c5810fc120e5f8966e39e1f7f4c4dbf8d6321eb3b525a212a4a4235b7f4ffeb27b24f2109d5c7dc7b2db0d6b81f24aa905fd5f07830e5722ca54e101d179af07a2a0e805bca2408a3d05d389ae90199f0b7c6822874238480a195401e49bb1f3b33d17430c89607d19f3229d78b45d47f4539c40259b049f36bd3ae48f2d50c4ff664ee7d82ca83befe82a1925e0ac486f62b8df8682bfb32fc9870095da071e02f4ca3e061773a0d6515b21963380dbfb5204117619c8b6fe9fc9f3fbb52fb1f29a5b71b5fc8734559f4b9f89b432f6d00fb1111a2b5ac9c60a60115c6a78d58a3d1e110f7adc074226934edb657bfbdb2092d5a0d75a4fba5ad0666af223083a5c9f82da9770d40942c116ad0d0c88de7869dead79024673506bb612c0a009ba131f31f604b6443b066bbd1844de014128e45fccd894d4684d659ed96cc52b4bdfde3ae96f47bc960f27d815e6f2a43f52b5918a613bae319f023600acd5bbbe3c2dee4085c79fca3f58fb3ac1fba620c36cdcbe3eea11172d34f8e8cb2a4faa31c403bd030e594e6191439f8a194b2f487e2a68a63167b7778c38be506c6f0b6ce13a9e3309744bc329c8dd3798cecb3546f5d4c926210fe97863aa1abccd3a2f37725df22ac72e68fcd2600589884bf81197e4179a0790beeaceb49dc95f31d48ff4582b92c85f6abb84b3562150f2220e5ef559050d83aeb31686ca6d8f1a6e9069d10bec479cc77da9b96cfef54a9c12f992b8abb5a8af1be5941a992d65e4000978dd31c5f8f8e92ac07641170bf72949c004c934823fed238c07fc2669705c944d5b47be8833f4d842125e226fc67bf69ee1bce25fea55db016fd7b8254f14d57782f8a9e71297f7fadba5aceddcefe214e2976b44ee9ad84a397376ca13d409383b059ded2499b5ea32752f4d0a3848121525d8ad2f6262bc4e92bceb184d3bcda9316e6d8a013bc9d7ef78ec738e687dd67c148d9fc50e648f2b4c0be378527f354740153287f1170862b021d6705d0e61916185684d8bffb1ca88ef99e0eac48c528aefbad810af60e539c1eab3157717dec292e66a515fba752344bc61157569fadc5edfcf494906a668e21e8006829ac2ebe666bb785fe91df08fa60ec7f61aed0155f44fa499c7116a3c17f61a34d3a6f7d0580a4595384ccb55290838c39c0b0c5b158dc8890703d747fb45fc6ca7ab0218599a5ecb651b987e0f49558e0eb5c625210003e80ef8b5318f2dc14f79c96bf952c8aab79be55fbf0c0ee5e7ca26d371afabb21d293ab59eaf72a1e2cc106dea53c37221b05ec10e2b4422b759d1bce8d4087749aef2d10fa0a9d79d0858620e70c002e79f92aeb41962ceee44754653e69affcf5f354b1078bf379069465e6d492b6fbd42580ce1e6da2d601dbadfc216acec1619fcfad16ec34990f5f40a017cf396601bd0f1a5a2255149818b2986bcaf4888f88940588ab235de9c8b09c5d7427a6305d4e1981991ddf9ad61f054e3381c7ee97269e8a13ef2de90217dbf3fc303416326433ecb0c4e45c79c06618bddbd9cb6893eee6488fe92c9aa8fba0e2b1493f6971d46d765170859ef47ca950254cac95b65359008dc0e39c45e764007951e823b5d9a3198a69e803fc164e37d8920f9b3f057e956cee9b1ffa8125fd337b91950a325fa43bffc2a8a99a1de2b05857fd2ce888a21e204743c31a63eb00ae7206618212376205a95b24074a567bbde8c4b808aa3fc76b186b0b935edbee53843d5005ee581f7739606338307ff16a13371a5171a2eec4285f6670f2479683ba8d6e8121fa990f2c163619403b7bc6d5094bc64340aa227c59519c94bca13d7b4449523d1dd316b26dca03c4dc85a83c6b6f6b80876a03f8a0ee659a16f38cd49726102c98b027f311b1138984f7264279ce72df2e1846623892fecccdc3c7811dacdfb4f79fd688ca5096e8a57751b3a5e793bc6dee8b1cb45d5ad850e623de8baea0c4358fef6fb3a1953c5e5a05c2fec7775914bcc7a45780f1a6e2812c16cc4081a6021196af5be5abea0275c3fbcf0989f6af7b067a72ca3f23b3cf76ba01850ddd2e0aff1b93a6153a7429818dfd697a84fe4c59a2301ab933d4f1e56c3ec0b8d9889e441d7592269e1a0db0f73f873afd08664c48404f087467921c600f480d05b3de6461442de3c189bc2172e7ae588bcf746994b2472d155059f5b00fe49d6c602f8e79d0ce9ff644b9a720dff550de3096e9bb1844aea67bc859cdbd397dd9236d7bdf96ad0fd058e8552ca4343cfc6121bf8743b1d8e2c2eb08e3418418953432a05f14d10eb9c15653401513358ae85589af3966be0b104bb7bf01bf693cca3d79513bb99b9e6a18d4baf51a38c4a36378f1879fa5916c8260483722a4381e09093174cd99af72bc5c94babb36ca25fb4e315847969e9b5bb52d7d9366f0481ff0a56eff638f48f07c1c6064de1e5aeefe9b518b0a15a3d601a533d71c841f58345d9e5658e11c6701809b344f4e366739640806c813d195af55f171d6df390828e4f1da5cfb34cffa098ce7d0af23e415a8246e81dec2282e27e479b08fedd51dc4b8b98173811e32ca78188ecd33db37e985741d6be4983dd470d5e3a8edb7d04a2e50851e97e5eb90e81eab20c7e785db36179f4766eca2e28b25562795705dd5cd5d02045e99c0022f07c7594f56bf09b0b175bb5afec197996750536e0f07e7794d2b8a90c878131e7d4ff0a6de362a3fa153b281e6fd6bd11546c174db669aa2ab292a9892c4ea06aa01c240546b41d4639a67733a3d6a419a703e6a0c741891ef303c15fd0f6b15115fd4eec33ca4f2c9c7c4757ccef7bb012913ae3a5eb24ce6c7687fb9a9006cbb202140d70c9bde9ffd3b72488dddd12cea516fdd168549b3e0da9995816e5f8b68864", 0x1000, 0x81}, {&(0x7f0000000980)="b79fb9e9ab4feba22ffb95e39a9060853a62b915f0eaedc37775ddf61fd6675768a619b30e2176b77e8bd8bbc022779a59f7d5babc2fc0f39f0109936c4eca0a445eae8e5246eff2c48d9f929e91903886f9a80d3b1159c0f05001cea72625e5459cfe6bc743788ddd09fc840b7ba65021fa18cea3580fa47ca203c17f3a752fa96354c9c46635e12adccc73f71bcaad70391900e11a7e33452ba5c7b8dec059176166e2f4f3604f", 0xa8, 0x100000000}, {&(0x7f0000000240)="d87255883e3bbad7f5ffa5087cdbc112a8e4e2a026824686e9e5821dd4a27c401f3c5cc87173bd64", 0x28, 0x4}], 0x34048, &(0x7f0000000b40)={[{@init_itable='init_itable'}], [{@subj_role={'subj_role', 0x3d, 'net/snmp\x00'}}, {@uid_eq={'uid', 0x3d, r7}}, {@obj_role={'obj_role', 0x3d, '/dev/rfkill\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, ']posix_acl_access{vmnet0:'}}, {@obj_user={'obj_user', 0x3d, '/dev/rfkill\x00'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r9}}, {@fsname={'fsname', 0x3d, '/dev/swradio#\x00'}}]}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fstat(r10, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', r7, r11) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) dup(r5) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:22 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(r4, &(0x7f0000000380)="768aef307e471f780f6b2b649dcdf75bb662695013320d5d3d31a40fbbeb3d0693f877f80a51c50a7cb184778b85358aa3d1fec3401bf4b1e0821cfc3754258abda52f7093d675cf72491d7f35fb2112c9f7d4c74457010fe164b7d6020000000000000015afed02d32311d2776154b9a490e1d5e91f90ff569a48f9d22b79bc31f10316116b2520647ed03e4d28ac6decdda5cca603f62eeff59ce11c0adac730a30776b61c0b9e6d1c2e36679ebfa7229900"/193, 0x206) r6 = dup(r3) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) accept$alg(r6, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:23 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:23 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in=@remote, @in6}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:23 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:23 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x68, r0, 0x800, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x8, @link='syz1\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}}, 0x20008040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:23 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:23 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 356.230108] net_ratelimit: 16 callbacks suppressed [ 356.230114] protocol 88fb is buggy, dev hsr_slave_0 [ 356.240242] protocol 88fb is buggy, dev hsr_slave_1 13:56:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r5, 0x23f, 0x0, 0x0, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000300000c410000000c98b23ab6c1ef36fa2c0a83889f9cb3400000007a3000"/49], 0x28}, 0x1, 0x0, 0x0, 0xce2df6290c4479fa}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x9], 0x0, 0x80}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f0000000080)) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f0000000140)={0x8, 0x3e, 0x81, 0xc3, &(0x7f0000000380)=""/195, 0x7f, &(0x7f0000000480)=""/127, 0xd1, &(0x7f0000000500)=""/209}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:24 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 356.790323] protocol 88fb is buggy, dev hsr_slave_0 [ 356.795494] protocol 88fb is buggy, dev hsr_slave_1 13:56:24 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bcsh0\x00', 0x2000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x1fd, 0x6, 0x3000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:24 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r1, 0x0, 0x40000) 13:56:24 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bcsh0\x00', 0x2000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 357.280116] protocol 88fb is buggy, dev hsr_slave_0 [ 357.285290] protocol 88fb is buggy, dev hsr_slave_1 [ 357.350168] protocol 88fb is buggy, dev hsr_slave_0 [ 357.355385] protocol 88fb is buggy, dev hsr_slave_1 [ 357.510531] protocol 88fb is buggy, dev hsr_slave_0 [ 357.516038] protocol 88fb is buggy, dev hsr_slave_1 13:56:25 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bcsh0\x00', 0x2000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:25 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:25 executing program 2: sendto$isdn(0xffffffffffffffff, &(0x7f0000000380)={0x262, 0x1ff, "aa74ac175851648234f4d2ecd07fbd14cc251b5ad86a65eb05f86f83ec0aa315186b085b6ade809f3862ab473c65f1551858d757d86a3b5fcee8bb3fe537e37c13db24568287318593037cec4fdef8a2e8f8126d168912116fd56ed4956fd37bc8ac3d8c689827f4254b00928758fe5438dd96fcafc90a3042a09c718cb07d3d2fe7c69cc72003fae8bbd1f261ab18abba9d9313a747d4e0e4d2c0d7cdc547f05d61dac0115a4ddf89f0ce4a7591f836047c3ded78efff4dededf2e05688a9688f59853aa2167825376a0db76afa614daed69e473f7103877f006ec4a20bbcdf0a8c48c55e9d0544463a564c1fb037d025f30e90d01cfa1c851d64fb4bfbe3f1c01d9fd9a739ddc36d71b93ac59a44ba0e22b01adc8afa04a4e686f9e9354e03410cc109ddfa253e04cb472cd4e034f9a1ed884c3ced57cbc5f2479766f2ac8042a7f01e3552312979b3674317962edee72779d45e25f41bca26f352ecea2c9f5d8bcca53eb7a8a1722760a536d4fbecd45dab7b5275ee85f1207ec2b9947c0ae8d6e3bfa20b982384ded9b22e7e673f02592475851967df3ddcd02ebc243a98af75d14c761af03f42a0790033d963abc5762c429f9170b406c6c267e181d7578c3f5e9896de782a5a7d79125e04fc6751c238c0f615d5f45f3bb6ed85c25f78e810027ef01d9b4a72e3324d61825813d220a2d13d615dc32eabf816ae9faa625fce0aad83a6c4e1d5827c0d7e09ff330d84644e9d61840f984f4e682bcad6a40a1cdca953ae613d963b5211a5830c6d40bdeeb5cea8c6ad339af95fadd1d390709d8d83587499feeebf66fea968ea5b0e3b1d13b7ac5f222d3c518747fb40d953933fd226c2a8280f9d13c4d2aafff8c479e6a510a4a2ad9ae1ab4cafdae91458dcb81659d31427e79c67ba28aaea9462bf2ebc29de6b670b401ebeea11fb7b1b26b0a6fdb79efae3b9c9200db5c72391c1e2e8d6882c6015b0740e6f07542c58030294dac78696ff07584abfe0d60f35223b0d61a10ebacbf6ef06c3dc412c4f185e00e0f90fbdaf302e18989e6d1a157c23aac6c5fe801d33baff12a872b675ade1b42b8a41e7b3fdf56da7a7d5afde9dbc829c82f3b2cfc862d29528728f8c92bf06651687bc7aa606b9638c17847ba9631b1a5736e13e0400f41d626217f989824d53d3ec0ce889e61810e5a2f9847f2e5da053911f1b53bab1f98c5aab78ae14c44c9470cd93e67717218cb54ffb03ae1c5d21c64c0f9697fdf921ad40058683c39f35e2a779e10e7f2de4d48b01e028f404b19fda192f34ceadd52b2d3c53de640e5a08e51a7383355519f0e2a295fb0ecbf2d26921d70cb60b395525af5d67219f7e2a9e877556abe26bf32989047e550ac94c78b67ec912df3ceabee619e1de19fac49399a5a91d842b1c4485748de41948d94d9a805feb3dd3361d8fe7c89ac4b70441209633eed87654382ca1f081459c3f47ad7665d6ee7ffe61ef3d35526015ad4e2f49dbc1d79290c451c552b61b3a0ae7f830938c7bc30400957e285339b6a1a9c570526276757635379b5abfafb0971bb7e0a095b8bb4702c78e2db104643566a2976039bbf8bf672fdcfcb226d1a4091ce24fa2e1f830c06bd8ac02cbbf5e5c8861a83c80068eeefef43c516b65e315427241bc51007445298e6481699daf8e997f2ddd37983039685a6695116e7c35226cfacb3196f24375e26721d0731ae206359bdf600b32199e950277c5422cc48032c20686cc7f4b05411ad8291ef034141e39f2bcc9d04d7e14d50abc8562d0d3b763932e7fa6376a361a8b9bb842bd0763a16da004f7c7df72cf9e22f1181af295a5a2f52da2ac3b2f36cb48cc323f4e06c024b7c48e33842a4b97f36fcf79441e4f9e9d18bee0dcafc533b02bf7ba1826492c2ae9dd1a7cb828ee193836bfdc7f6f640ae92bebe31850864af1974a18ad4d473c8e6a269f8310c934f717052e056af6622d874cf9eee361c8ae8d1eaf229bb22ef97cac69cef4c75901a09d618955c59fe31d887780418f255872cb9f298b52a2f4f9f9c457ec04d5fabdcae1543027699143a8e77c1fb32a813b101c99841c57e6e5ee4624fec44297c029789d3295000e4c38a02159a1ada7e9a5a68eb2efea5a57802c2e361e89c8f90a6448ece6c7e8f60da05c78e465c56a7c4357edb9ad1f6249cc6644e67d6d216494141aada6f52aa62546946e1d4c8fa08f4841880de9562bb0b98440949544e8bd18189f60a183754c65096491b702691eee3bd4cab95c44546a93df7b8979913b7712860061066d014553eda61d7957550f6e48da5f21578cd39995228a3844c17d843cc73af05963d5d571dfe246464e09c64188f3f1d9124ca4fe9bd395854f43af177533f9122a91222e7dfaaa650db3ebcc3a15185424d240f140bc7329ac3fbe440de9f7c187f109f0690a605f62428eeb2029f97385e42f4684ce8a57f36b3b651487a650c7f326c984a1f4498b20dab39b8ffc4a2cdd73c50791bd2b18e84b03f05f9f800f90b09fbc385692899126237ff8215e6707f28952e2fb8de93e221e4f9f62d82b3387155a984f28992ff37ab8d90fc83c27be59b1491110d2524ec7548d355c6dcb92ad5f85ca5907f60ad56931ef01892270c6eaf387d62082826a5470f1c77a6ff52f97be4680f5dce4b38af729e5dfd1e375debe376cecfbb264757d0b5c86c29ee26254c9874b81a23b01556e7484af6cc9e1af5b8b659ea8645a46d3cd88d77f542a928eadac9870d900534e76ca53803c66b4b987e57d18f6b56500fb6d74588ae2d7078cd7fa87fad27710974498bb3ee8800f8f65cd38f019a776f3616845f8f412ed3a7a8e1e6a5e9134101fbbbb7fcb243e56d3e1e57996b81874ca6e6c981d795d5d54a43aedf7e95864d8fc9485997a0338e7bab88fb5c2a009db86bb1c0b8df317266d5b7905348ea8fc2af8c9ad1bc2c8c6ccc4f4890411b0ea96c96c019aefb79f85423822ac0d618ba3ea1b75588f2ea1f4ddd1bd5f3e8f5e0207d68b5570cb2d0d3b2f89b6b9bd2dbf55739cb922db940f898ba8b49e4e2c734001c26e5fc7b42e83c04dcca9bc160b033377a63d879f632103dd85cbbbda8e13fe81e3187a79a072721eb68a28371cb7fadea324c925be1e703b07c050bb1d412659e00b0f9654c5f356d7bd8dcf070a7a151b1cc80a5b364e35c2d1746c1a0a9a202ec75d992c0ec0e40a81883f0667e1cb89983c7e29a5949e58a35ea142e9387a768a4c09bfad208faf0c3c470a5fac5491a3099d13e847d6eeabe056e1edfe8ffada667b75a6d8b9af3526ee0acc40eb96e5e68362d27001ac85559c22f47c6aa2644de8a1805f83854f3d8d5d5bd1febfc6089fea883298c22d1df23b42a754ccea19bfc8185cc9dfbea597508c5ab886e259094f2c8acfeb8fe5f1b4d5af0bece2bc0a888a4265b87dda76ebcdf14ad37e311a03f5d84d82281688a8b862b94200447daa388a34cc8655de4b54fef208ba38fcfb0bc7e30f7e05972d4b4fb8252419a50a71a96764eda0219e931fe5914cf80b49b83b70623443506ee96dcedea3674aac9638a4a3375623d9e4eb497cba2cfb42906807b8d80960bf5b9274593744d5ee03a6e8ecce6eb2217e50ed33fd6fc921b663858fab7ab19f9542845b1d7a03240dbbbfe785ef79111fd57e9e8a3f33b366bf8030a2978e3303c052d8d05f74a2cd310235bca51157a2bfa1a8f8382ece1a17189bfa19acfaf5794a5b1c1bacd9d7801cf026051a86c1dc215705d2d47857ce1f6ae9992b526d98e8ab9e09c764c931bf5d948b10ea7e82cacdb4a889cf7c1347776867704058ce8c3a8b1db75c3c18845be4b4b972c42eba4970a2385b7cf6ea725ce457e521e05363d4e746382a947d9dcdacc4eda1e708db00b8282f961a5d06b31a14619f568e445901268e090607191e4a4f53a261140b6543cb6baf73bd6f5f12e437d865cf62f633cc6eb5af1f92e00f2618b93a3598225c03f35f3eada83c898cf348d831f84393c48f140c3b421d7a81bc1aaa5ea02327d53a73437d915bf20a83ac400445fc236b42744aca02b8e29ef615cf4aeb154f891a376b8aa5945de8fa8f1c352bf501f7dceeaac624d841240ba6490aee65b92e9421ae6fc7d17ce6078551d6fbbe80477a51117d5591d7a4f892592ecd91226b99d4cade45b330ae0467e8242f1b9c49092fff9996b5f6c4cc11568e53422b073f8fd4dab179d6f0fc1918fba463306a51b846d5a818f335e440da6736bcdd3772c3f9800d83be61999cacd4eb970b41b272fbd3dbe02a05e153ea290d7673041c665689302fa7f308b55ca31450e3ed04f6e33f44c43d5e3935ca6d899af32fd83598bf9e97783d7167725f5ab1c866749cc7a29a495d2820132d6a7ef14edc7cca856e6f866de96a29e88901086dd46b7318e7b5e77eccee6ff6bcbe72f866fcab7c03a20b19a1fa888929812fea3e8cc01f575914467f664b7c50329bbf23ad407339729f8ae1b94e2ba5286869de3c4fe095f5b74a8e06dc03f0613bf233ae3ad2411fed1f0aa7b8e531ff2d06c438cbd6009aeac48750c408911c674a6a6420479b93af61f0b9455cb2aa6eef05dec0acc400b6935db1d83b70007737a9c21fd8b1be414446a37c2885053f834200a48257159893a9df1c677a889321dabdc6b9723b42516a5eb0e025b52a2dd04034eab26de4e91ab7376fa513b6893e69fae0569c291c238019892d4270e12c5a6db3368c4a5c65de59704d5f13daf8fc8efacd56b45dbfc876a172c37f18dde683d19e8db9d5c18bcb3df4ee44d4d983df308846c8ccb6a4533e58b3f23f661babcb0ee4b231315b34be214cdd32dd9eca6ec893e2a13ac73f7c7593c65f4e38b97bb657ed2046fb64acccc84f3ea4527fcd71f0e7c2ce3a46e149ec84a634a8f904d4fa018c151f7603d0474eb721fba4567c94f8d2bf176cf934861e5e26590ee76c74d5d36c9703504b18649d83268d3074967d9d9ae202af362e80bfb1fbd39c2d4295e63cd9fdaaf61727ab1d17cb82c70a45469810c740979624dd2a09bd5f502732061d7cb53e3367e1326d60150f9c2b44d4e534d03214084420daf7b0cf896f8f5f01635a80c0ea20a853ef54edc0b94babf6028b2d5be56b548d6af862d5ae80ba3e13b3a0aee9378435433c0c02ce34adde76e86f5145d232d8d0671f754d842605eb6fc1c7f3a721179cb46a69a65cefa399cd9318d31444a77a656d0811f10bc14df5a9fa67e2a3dc18bd28ea3dc5d68a6fe4edaed43623aa176a6683586fb4b03d3103a0bce4eaa3e024fca6e014a2869ea89f8400318d43e21bfbaf91db77390a94bd2cd045420c66cd48590bfeb68dbbc2a878b38242d9d30722252ce00ba477e6f2107120b46debcd14bb1b61a08df5bf2faa231eece4e9eecb1db2cecd975c19595dffe08f414b5058f2008822c063d868e9a256e6112e0dda0f53bea186bd6f40338b40ede2f9cf618ecab3d6027d8ce085ff6e62a8f872ab03594df48a126a06b5ee07451153236a9d18ffeb18eff3d855d91607c5692eef7ae6b74f6415e68e8208cf119cd2b1bebb9e69a7a61e759c0338d4d37c844feaf7b403c1cefc091bf32bad0c40367533c4bd6eb0d338ef676d797fbf895fea5cb5a413866256add9dcf3a810a78948f2ac4b242558047c89b792fb4b064eab33e0581246feba5ccaeb62330e2b0e50e38f9233163f78860a50f32f947bc5e1839f462b44b1f1688e71c8f2269458a178130deeae"}, 0x1008, 0x40000040, &(0x7f0000000080)={0x22, 0x54, 0x4, 0x3, 0x6}, 0x6) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = dup(r2) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="200093e17a8f50d03e7c70030000131f6445d3f7d9c0018700000000000000032411"], &(0x7f0000000240)=0x28) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x383}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0xfff, 0x40000004, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x2]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) dup(r6) ioctl$IOC_PR_PREEMPT(r6, 0x401870cb, &(0x7f0000000380)={0x1f9e, 0x6, 0x1, 0x5}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f0000000080)={0x8, 0x4, 0x2, 0x2}, 0x6) lookup_dcookie(0x4, &(0x7f0000000140)=""/43, 0x2b) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 13:56:25 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r6, &(0x7f0000000040)='net/netfilter\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) [ 358.045331] audit: type=1804 audit(1569765385.724:1115): pid=15509 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/223/bus" dev="sda1" ino=17376 res=1 13:56:25 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 358.082763] audit: type=1804 audit(1569765385.754:1116): pid=15509 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/223/bus" dev="sda1" ino=17376 res=1 13:56:25 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 358.140176] audit: type=1804 audit(1569765385.754:1117): pid=15509 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/223/bus" dev="sda1" ino=17376 res=1 13:56:26 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r6, &(0x7f0000000040)='net/netfilter\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bcsh0\x00', 0x2000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0x6, 0x200, 0x10001, 0x0, 0x80000001, 0x1, 0xff11, 0x5, 0x100, 0x0, 0x7fffffff, 0xdd8c, 0x4, 0x0, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x5f4, 0x3f, 0x81, 0x3f, 0x8, 0x5, 0x8, 0x9b, 0x7f, 0xc93f, 0x5, 0x82b, 0xd30e]}) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 358.421938] audit: type=1804 audit(1569765386.104:1118): pid=15525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/224/bus" dev="sda1" ino=17378 res=1 13:56:26 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r6, &(0x7f0000000040)='net/netfilter\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x3) 13:56:26 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 358.635407] audit: type=1804 audit(1569765386.104:1119): pid=15525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/224/bus" dev="sda1" ino=17378 res=1 13:56:26 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r6, &(0x7f0000000040)='net/netfilter\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) [ 358.808311] audit: type=1804 audit(1569765386.104:1120): pid=15525 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/224/bus" dev="sda1" ino=17378 res=1 13:56:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup2(0xffffffffffffffff, r1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) dup(r4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="163f5d871a91cf879c51930dc1dd56d69b5aeeb902bde50d3dc62589759cbef1fdf7ea820000", @ANYRES32=0x0], &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000180)={r5, 0x3f, 0x0, 0x7f, 0xd650}, &(0x7f00000001c0)=0x18) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 358.911798] audit: type=1804 audit(1569765386.384:1121): pid=15542 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/225/bus" dev="sda1" ino=17366 res=1 [ 358.941954] audit: type=1804 audit(1569765386.394:1122): pid=15539 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/225/bus" dev="sda1" ino=17366 res=1 [ 358.979769] audit: type=1804 audit(1569765386.394:1123): pid=15539 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/225/bus" dev="sda1" ino=17366 res=1 [ 359.007824] audit: type=1804 audit(1569765386.584:1124): pid=15555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir002245537/syzkaller.kgekDh/226/bus" dev="sda1" ino=17366 res=1 13:56:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)="095abcc76fe89a97c95e841b13cf022149c2375162faed101b85b3b185e98f0063f022f88adba6884e6aebd6e2baee40aa5c359d7b6f7ca8391e0a2467d97e9905cd68221b94e00fdadbb7d38ca88359c7d7571228e4667b9e94d8374127f2fbb7ffffa0cf49a787f398bb4dad0ba248f07eca9a611bf49a4b76", 0x7a}], 0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:26 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r6, &(0x7f0000000040)='net/netfilter\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)) [ 359.111169] kvm_hv_get_msr: 258 callbacks suppressed [ 359.111178] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 [ 359.147152] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 [ 359.174637] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000a [ 359.193373] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000c [ 359.207533] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000e [ 359.216188] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000012 13:56:26 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 359.224966] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000014 [ 359.233456] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000015 [ 359.241670] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000016 [ 359.253202] kvm [15556]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000017 [ 359.261637] kvm [15556]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x260e49 13:56:27 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r6, &(0x7f0000000040)='net/netfilter\x00') ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setstatus(r2, 0x4, 0x6000) 13:56:27 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bcsh0\x00', 0x2000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0x6, 0x200, 0x10001, 0x0, 0x80000001, 0x1, 0xff11, 0x5, 0x100, 0x0, 0x7fffffff, 0xdd8c, 0x4, 0x0, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x5f4, 0x3f, 0x81, 0x3f, 0x8, 0x5, 0x8, 0x9b, 0x7f, 0xc93f, 0x5, 0x82b, 0xd30e]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:27 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r5, &(0x7f0000000040)='net/netfilter\x00') ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 13:56:27 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:27 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) fcntl$dupfd(r3, 0x0, r2) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r4, &(0x7f0000000040)='net/netfilter\x00') 13:56:27 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) fcntl$dupfd(r3, 0x0, r2) r4 = getpid() syz_open_procfs(r4, &(0x7f0000000040)='net/netfilter\x00') 13:56:27 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) fcntl$dupfd(r3, 0x0, r2) syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') 13:56:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 359.827817] kvm [15610]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x1e6da 13:56:27 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) fcntl$dupfd(r3, 0x0, r2) syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') 13:56:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000001c0)={0x6}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_PRIORITY(r4, 0x80045643, 0x6) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000180)=0x4) 13:56:27 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000380)) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x1b, &(0x7f0000000100)={&(0x7f0000000080)="c422553e3e2e65450fae4e00420f61860000000067f040832eced1426b45396d00f3420f1efec4c1fae6d1c4e2153619660f38f8b307000000", {0x5}, 0x90000000, &(0x7f00000000c0)="c4e3617dbd0d0000dfb7c40109dc0b0f01efc4e1bde1e63e430f0d5205660fd7d801243e6767459dc4c2b53b767d65653e6466430f3823749a00"}, &(0x7f0000000280)={&(0x7f0000000200)="c4227d2aa209000000662edd8c9a00008020c4817d7f40488f4808852c740c8fa878c01bf30f8a0000000066440f55388ea900000000c421116bf32665660ffa3e", {}, 0x0, &(0x7f0000000140)="0f0d2b0f18cd2e260ff1d3c423f9df972a00000097c481fe12884a000000363e0f01fac42140c6a0940b695b38c4617211e50fd34137c4c14c58ff"}, 0x8, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) write$FUSE_LSEEK(r1, &(0x7f0000000500)={0x18, 0x75f954852e74d177, 0x8, {0x3f}}, 0x18) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:27 executing program 0: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) fcntl$dupfd(r3, 0x0, r2) syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') 13:56:27 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) fcntl$dupfd(r3, 0x0, r2) syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') 13:56:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20204804}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x100, 0x70bd28, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20080010) 13:56:27 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000040)='net/netfilter\x00') 13:56:28 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(0x0, 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:28 executing program 0: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xc, 0x3, 0x4000000) fcntl$dupfd(r3, 0x0, r2) syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') 13:56:28 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000040)='net/netfilter\x00') 13:56:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bcsh0\x00', 0x2000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0x6, 0x200, 0x10001, 0x0, 0x80000001, 0x1, 0xff11, 0x5, 0x100, 0x0, 0x7fffffff, 0xdd8c, 0x4, 0x0, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x5f4, 0x3f, 0x81, 0x3f, 0x8, 0x5, 0x8, 0x9b, 0x7f, 0xc93f, 0x5, 0x82b, 0xd30e]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000300)={0x5, 0xc00000, "9548c1ad1de6ce77897ba5de91a75aacb6398cc1698d5002", {0x5be, 0x7fffffff}, 0x6c}) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:28 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) write$apparmor_exec(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7afb5a23887c34066e8c660adf713bf1d31e6ba69a8542418f7bd7a0cd7b080ddd1d8f05e620566e08615fd8fd681ca25e4a9dc5daf7b82aef13b794a0d7e8bea232c098266d3da622"], 0x1) r2 = getpid() syz_open_procfs(r2, &(0x7f0000000040)='net/netfilter\x00') 13:56:28 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = getpid() syz_open_procfs(r1, &(0x7f0000000040)='net/netfilter\x00') 13:56:28 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = getpid() syz_open_procfs(r1, &(0x7f0000000040)='net/netfilter\x00') 13:56:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r3) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, r3) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="b694e8bcb7bdb321ee427b894132feedb37eb20b8b27251edcb295dc73e29aafe76654a5f108acf1b67f8d860e097183770f8b21dfd40924a8acf538eab19d1ef8f0434b315b7f5276f6486388cf6aef56163b", 0x53, r3) keyctl$revoke(0x3, r4) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fchmod(r5, 0x30) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:28 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r0, 0x0) r1 = getpid() syz_open_procfs(r1, &(0x7f0000000040)='net/netfilter\x00') 13:56:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="3cbfbf38ddf0263a7473489b2afae0ee00ffed75b5f463b813f452541fc549b217f3e40da0a781b7f657f16728da19546614dfb8baf7bd11986e6a9365cd772dca28b214de3762a73417c7880718e57affcea615975a03b539f4d0c366a3bea45a137823e7f478a302f623c02e64c802b79e643254be27eb40f7462ec484c3da6691b0f2e7a63c6ccd998195c432f2ed985006294e0db21e7749b216b091bbeee72f21be40a5d007fb0c0b6b4b5e5bd69634b53dbc9effbe", 0xb8}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'veth0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xe}}}) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{0x8000, 0x5, 0x5, 0x2}, {0x7fff, 0x6, 0x7d, 0xf5eb}, {0x7, 0x4, 0x1, 0x81}, {0xfffd, 0xff, 0x10, 0x5}, {0x7, 0x5, 0x3f, 0x4efae3ce}, {0x6, 0x2, 0x20, 0x6}, {0x7, 0x5, 0x7f, 0x67b}]}, 0x10) [ 360.980769] kvm [15670]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0xadd94 [ 360.990789] kvm [15670]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 361.000380] kvm [15670]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 13:56:28 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) 13:56:28 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000040)='net/netfilter\x00') 13:56:28 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(0x0, 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:28 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000040)='net/netfilter\x00') 13:56:28 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) 13:56:29 executing program 2: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000040)='net/netfilter\x00') 13:56:29 executing program 2: getpid() syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') [ 361.443624] net_ratelimit: 14 callbacks suppressed [ 361.443631] protocol 88fb is buggy, dev hsr_slave_0 [ 361.453711] protocol 88fb is buggy, dev hsr_slave_1 13:56:29 executing program 2: getpid() syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') [ 361.510134] protocol 88fb is buggy, dev hsr_slave_0 [ 361.515344] protocol 88fb is buggy, dev hsr_slave_1 13:56:29 executing program 2: getpid() syz_open_procfs(0x0, &(0x7f0000000040)='net/netfilter\x00') [ 361.670303] protocol 88fb is buggy, dev hsr_slave_0 [ 361.675578] protocol 88fb is buggy, dev hsr_slave_1 13:56:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), &(0x7f0000000140)=0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:29 executing program 2: r0 = getpid() syz_open_procfs(r0, 0x0) 13:56:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7ff, 0x80) write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0)={0x0, 0x8}, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000140)={0x2, 0x0, 0x8001, 0x4, 0x7, 0x4}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:29 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) 13:56:29 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'bcsh0\x00', 0x2000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0x6, 0x200, 0x10001, 0x0, 0x80000001, 0x1, 0xff11, 0x5, 0x100, 0x0, 0x7fffffff, 0xdd8c, 0x4, 0x0, 0x2, 0x0, 0x8000, 0x200, 0x8, 0x5f4, 0x3f, 0x81, 0x3f, 0x8, 0x5, 0x8, 0x9b, 0x7f, 0xc93f, 0x5, 0x82b, 0xd30e]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000300)={0x5, 0xc00000, "9548c1ad1de6ce77897ba5de91a75aacb6398cc1698d5002", {0x5be, 0x7fffffff}, 0x6c}) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) syz_open_dev$swradio(0x0, 0x1, 0x2) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 13:56:29 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(0x0, 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000380)={@l2={0x1f, 0x6, {0x9, 0x4, 0x81, 0x5, 0x4a, 0x1}, 0x2, 0x1}, {&(0x7f0000000140)=""/147, 0x93}, &(0x7f0000000240), 0x40}, 0xa0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:29 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(0x0, 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) migrate_pages(r1, 0x400, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x620d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 362.470693] protocol 88fb is buggy, dev hsr_slave_0 [ 362.476303] protocol 88fb is buggy, dev hsr_slave_1 13:56:30 executing program 4: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x40, 0xa100) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000080)={0x40, 0xf, 0x2, "1dc6e230340e803be78e8665d7a59d68451e944410718be28c99df81b5b2a4d4", 0x42475251}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) migrate_pages(r1, 0x400, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x620d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:30 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) 13:56:30 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(0xffffffffffffffff, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) [ 363.031164] protocol 88fb is buggy, dev hsr_slave_0 [ 363.036924] protocol 88fb is buggy, dev hsr_slave_1 13:56:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) migrate_pages(r1, 0x400, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x620d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:31 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(0x0, 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:31 executing program 2: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x40, 0xa100) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000080)={0x40, 0xf, 0x2, "1dc6e230340e803be78e8665d7a59d68451e944410718be28c99df81b5b2a4d4", 0x42475251}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7ff, 0x80) write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0)={0x0, 0x8}, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000140)={0x2, 0x0, 0x8001, 0x4, 0x7, 0x4}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:31 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) 13:56:31 executing program 5 (fault-call:1 fault-nth:0): r0 = getpid() syz_open_procfs(r0, 0x0) [ 363.884757] FAULT_INJECTION: forcing a failure. [ 363.884757] name failslab, interval 1, probability 0, space 0, times 0 [ 363.928722] CPU: 1 PID: 15840 Comm: syz-executor.5 Not tainted 4.14.146 #0 [ 363.935978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.945330] Call Trace: [ 363.947921] dump_stack+0x138/0x197 [ 363.951546] should_fail.cold+0x10f/0x159 [ 363.955684] should_failslab+0xdb/0x130 [ 363.959648] kmem_cache_alloc+0x2d7/0x780 [ 363.963783] ? lock_downgrade+0x6e0/0x6e0 [ 363.967924] getname_flags+0xcb/0x580 [ 363.971710] getname+0x1a/0x20 [ 363.974887] do_sys_open+0x1e7/0x430 [ 363.978594] ? filp_open+0x70/0x70 [ 363.982127] SyS_open+0x2d/0x40 [ 363.985390] ? do_sys_open+0x430/0x430 [ 363.989280] do_syscall_64+0x1e8/0x640 [ 363.993163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.998017] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.003192] RIP: 0033:0x413911 [ 364.006366] RSP: 002b:00007ff7e5f9abb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 364.014059] RAX: ffffffffffffffda RBX: 00007ff7e5f9ac90 RCX: 0000000000413911 [ 364.021315] RDX: 0000000000403dcf RSI: 0000000000000002 RDI: 00007ff7e5f9abd0 [ 364.028570] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000001a [ 364.035825] R10: 0000000000000006 R11: 0000000000000293 R12: 00007ff7e5f9b6d4 [ 364.043165] R13: 00000000004c9061 R14: 00000000004e0248 R15: 0000000000000003 13:56:32 executing program 0 (fault-call:5 fault-nth:0): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:32 executing program 4: r0 = syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x0, 0x2142) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000400), 0x4) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 364.571499] FAULT_INJECTION: forcing a failure. [ 364.571499] name failslab, interval 1, probability 0, space 0, times 0 [ 364.605522] CPU: 0 PID: 15848 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 364.612590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.621957] Call Trace: [ 364.624570] dump_stack+0x138/0x197 [ 364.628220] should_fail.cold+0x10f/0x159 [ 364.632388] should_failslab+0xdb/0x130 [ 364.636405] kmem_cache_alloc_trace+0x2e9/0x790 [ 364.641096] alloc_pipe_info+0xb0/0x380 [ 364.645079] splice_direct_to_actor+0x5d2/0x7b0 [ 364.649749] ? avc_policy_seqno+0x9/0x20 [ 364.653799] ? selinux_file_permission+0x85/0x480 [ 364.658628] ? generic_pipe_buf_nosteal+0x10/0x10 [ 364.663456] ? security_file_permission+0x89/0x1f0 [ 364.668381] ? do_splice_to+0x170/0x170 [ 364.672342] ? rw_verify_area+0xea/0x2b0 [ 364.676390] do_splice_direct+0x18d/0x230 [ 364.680522] ? splice_direct_to_actor+0x7b0/0x7b0 [ 364.685367] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 364.690125] ? __sb_start_write+0x153/0x2f0 [ 364.694432] do_sendfile+0x4db/0xbd0 [ 364.698149] ? do_compat_pwritev64+0x140/0x140 [ 364.702738] ? kasan_check_write+0x14/0x20 [ 364.706980] ? _copy_from_user+0x99/0x110 [ 364.711121] SyS_sendfile64+0x9d/0x110 [ 364.714997] ? SyS_sendfile+0x130/0x130 [ 364.718958] ? do_syscall_64+0x53/0x640 [ 364.722917] ? SyS_sendfile+0x130/0x130 [ 364.726874] do_syscall_64+0x1e8/0x640 [ 364.730748] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.735593] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.740768] RIP: 0033:0x459a29 [ 364.743941] RSP: 002b:00007fcaf3af9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 364.751635] RAX: ffffffffffffffda RBX: 00007fcaf3af9c90 RCX: 0000000000459a29 [ 364.758900] RDX: 00000000200001c0 RSI: 0000000000000004 RDI: 0000000000000007 13:56:32 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(0xffffffffffffffff, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) [ 364.766156] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 364.773413] R10: 000000010a000d02 R11: 0000000000000246 R12: 00007fcaf3afa6d4 [ 364.780666] R13: 00000000004c721c R14: 00000000004dca50 R15: 0000000000000008 13:56:32 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(0xffffffffffffffff, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) 13:56:32 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x9, 0x405}, 0x5abaa0dcc2279338) r3 = getpgrp(r2) ptrace$cont(0x20, r3, 0x45, 0x2) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000000)) 13:56:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000080)={r4, @in={{0x2, 0x4e22, @broadcast}}, 0x4, 0x5}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r5, 0x110, 0x4, &(0x7f0000000200)=0x1, 0x4) 13:56:33 executing program 0 (fault-call:5 fault-nth:1): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700), 0x1be}, 0x4004980) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x880822}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x8080}, 0x4) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) [ 365.456312] FAULT_INJECTION: forcing a failure. [ 365.456312] name failslab, interval 1, probability 0, space 0, times 0 [ 365.515794] CPU: 0 PID: 15883 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 365.522869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.532392] Call Trace: [ 365.535002] dump_stack+0x138/0x197 [ 365.538651] should_fail.cold+0x10f/0x159 [ 365.542824] should_failslab+0xdb/0x130 [ 365.546822] __kmalloc+0x2f0/0x7a0 [ 365.550377] ? kmem_cache_alloc_trace+0x623/0x790 [ 365.555229] ? alloc_pipe_info+0x15c/0x380 [ 365.559456] alloc_pipe_info+0x15c/0x380 [ 365.563506] splice_direct_to_actor+0x5d2/0x7b0 [ 365.568161] ? avc_policy_seqno+0x9/0x20 [ 365.572209] ? selinux_file_permission+0x85/0x480 [ 365.577034] ? generic_pipe_buf_nosteal+0x10/0x10 [ 365.581888] ? security_file_permission+0x89/0x1f0 [ 365.586806] ? do_splice_to+0x170/0x170 [ 365.590768] ? rw_verify_area+0xea/0x2b0 [ 365.594824] do_splice_direct+0x18d/0x230 [ 365.598958] ? splice_direct_to_actor+0x7b0/0x7b0 [ 365.603789] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 365.608532] ? __sb_start_write+0x153/0x2f0 [ 365.612854] do_sendfile+0x4db/0xbd0 [ 365.616557] ? do_compat_pwritev64+0x140/0x140 [ 365.621123] ? kasan_check_write+0x14/0x20 [ 365.625343] ? _copy_from_user+0x99/0x110 [ 365.629488] SyS_sendfile64+0x9d/0x110 [ 365.633361] ? SyS_sendfile+0x130/0x130 [ 365.637320] ? do_syscall_64+0x53/0x640 [ 365.641280] ? SyS_sendfile+0x130/0x130 [ 365.645239] do_syscall_64+0x1e8/0x640 [ 365.649119] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.653951] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.659123] RIP: 0033:0x459a29 [ 365.662309] RSP: 002b:00007fcaf3af9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 365.670089] RAX: ffffffffffffffda RBX: 00007fcaf3af9c90 RCX: 0000000000459a29 [ 365.677361] RDX: 00000000200001c0 RSI: 0000000000000004 RDI: 0000000000000007 [ 365.684624] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 365.691883] R10: 000000010a000d02 R11: 0000000000000246 R12: 00007fcaf3afa6d4 [ 365.699141] R13: 00000000004c721c R14: 00000000004dca50 R15: 0000000000000008 13:56:33 executing program 2 (fault-call:3 fault-nth:0): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:33 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(0xffffffffffffffff, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) 13:56:33 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) tkill(r1, 0xb) [ 365.787788] FAULT_INJECTION: forcing a failure. [ 365.787788] name failslab, interval 1, probability 0, space 0, times 0 [ 365.827273] CPU: 1 PID: 15889 Comm: syz-executor.2 Not tainted 4.14.146 #0 [ 365.834329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.834387] Call Trace: [ 365.834406] dump_stack+0x138/0x197 [ 365.834425] should_fail.cold+0x10f/0x159 [ 365.834441] should_failslab+0xdb/0x130 [ 365.834454] kmem_cache_alloc_trace+0x2e9/0x790 [ 365.834478] alloc_pipe_info+0xb0/0x380 [ 365.834490] splice_direct_to_actor+0x5d2/0x7b0 [ 365.834500] ? avc_policy_seqno+0x9/0x20 [ 365.834510] ? selinux_file_permission+0x85/0x480 [ 365.834517] ? generic_pipe_buf_nosteal+0x10/0x10 [ 365.834530] ? security_file_permission+0x89/0x1f0 [ 365.834538] ? do_splice_to+0x170/0x170 [ 365.834547] ? rw_verify_area+0xea/0x2b0 [ 365.834559] do_splice_direct+0x18d/0x230 [ 365.834568] ? splice_direct_to_actor+0x7b0/0x7b0 [ 365.834583] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 365.862941] ? __sb_start_write+0x153/0x2f0 [ 365.862957] do_sendfile+0x4db/0xbd0 [ 365.862975] ? do_compat_pwritev64+0x140/0x140 [ 365.862987] ? kasan_check_write+0x14/0x20 [ 365.862998] ? _copy_from_user+0x99/0x110 [ 365.933029] SyS_sendfile64+0x9d/0x110 [ 365.936931] ? SyS_sendfile+0x130/0x130 [ 365.940916] ? do_syscall_64+0x53/0x640 [ 365.944928] ? SyS_sendfile+0x130/0x130 [ 365.948913] do_syscall_64+0x1e8/0x640 [ 365.952805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.957663] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.962857] RIP: 0033:0x459a29 [ 365.966049] RSP: 002b:00007f128cf68c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 365.973766] RAX: ffffffffffffffda RBX: 00007f128cf68c90 RCX: 0000000000459a29 [ 365.981042] RDX: 00000000200001c0 RSI: 0000000000000004 RDI: 0000000000000005 [ 365.988345] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 365.995628] R10: 000000010a000d02 R11: 0000000000000246 R12: 00007f128cf696d4 [ 366.002924] R13: 00000000004c721c R14: 00000000004dca50 R15: 0000000000000006 13:56:33 executing program 0 (fault-call:5 fault-nth:2): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 366.297755] FAULT_INJECTION: forcing a failure. [ 366.297755] name failslab, interval 1, probability 0, space 0, times 0 [ 366.322877] CPU: 1 PID: 15906 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 366.329939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.339304] Call Trace: [ 366.341908] dump_stack+0x138/0x197 [ 366.345568] should_fail.cold+0x10f/0x159 [ 366.349732] should_failslab+0xdb/0x130 [ 366.353717] kmem_cache_alloc_node_trace+0x280/0x770 [ 366.358830] ? lock_downgrade+0x6e0/0x6e0 [ 366.362993] __kmalloc_node+0x3d/0x80 [ 366.366797] kvmalloc_node+0x4e/0xe0 [ 366.370521] iov_iter_get_pages_alloc+0x4a7/0xef0 [ 366.375384] ? iov_iter_revert+0x9c0/0x9c0 [ 366.379632] ? iov_iter_pipe+0x9f/0x2c0 [ 366.383621] default_file_splice_read+0x17c/0x7b0 [ 366.388478] ? __kmalloc+0x15d/0x7a0 [ 366.392290] ? alloc_pipe_info+0x15c/0x380 [ 366.396534] ? splice_direct_to_actor+0x5d2/0x7b0 [ 366.401382] ? do_splice_direct+0x18d/0x230 [ 366.405718] ? do_syscall_64+0x1e8/0x640 [ 366.409793] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.415173] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 366.420287] ? trace_hardirqs_on+0x10/0x10 [ 366.424534] ? trace_hardirqs_on+0x10/0x10 [ 366.428785] ? __lock_is_held+0xb6/0x140 [ 366.432856] ? save_trace+0x290/0x290 [ 366.436679] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 366.443363] ? fsnotify+0x11e0/0x11e0 [ 366.447182] ? __inode_security_revalidate+0xd6/0x130 [ 366.452389] ? avc_policy_seqno+0x9/0x20 [ 366.456470] ? selinux_file_permission+0x85/0x480 [ 366.461329] ? security_file_permission+0x89/0x1f0 [ 366.466270] ? rw_verify_area+0xea/0x2b0 [ 366.470344] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 366.475461] do_splice_to+0x105/0x170 [ 366.479277] splice_direct_to_actor+0x222/0x7b0 [ 366.484083] ? generic_pipe_buf_nosteal+0x10/0x10 [ 366.488944] ? do_splice_to+0x170/0x170 [ 366.492961] ? rw_verify_area+0xea/0x2b0 [ 366.497037] do_splice_direct+0x18d/0x230 [ 366.501212] ? splice_direct_to_actor+0x7b0/0x7b0 [ 366.506082] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 366.510850] ? __sb_start_write+0x153/0x2f0 [ 366.515186] do_sendfile+0x4db/0xbd0 [ 366.518912] ? do_compat_pwritev64+0x140/0x140 [ 366.523507] ? kasan_check_write+0x14/0x20 [ 366.527751] ? _copy_from_user+0x99/0x110 [ 366.531917] SyS_sendfile64+0x9d/0x110 [ 366.535819] ? SyS_sendfile+0x130/0x130 [ 366.539800] ? do_syscall_64+0x53/0x640 [ 366.543793] ? SyS_sendfile+0x130/0x130 13:56:34 executing program 5: r0 = getpid() pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r2, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00', r3}, 0x30) syz_open_procfs(r4, 0x0) [ 366.547786] do_syscall_64+0x1e8/0x640 [ 366.551687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 366.556548] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.561745] RIP: 0033:0x459a29 [ 366.564941] RSP: 002b:00007fcaf3af9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 366.572666] RAX: ffffffffffffffda RBX: 00007fcaf3af9c90 RCX: 0000000000459a29 [ 366.579946] RDX: 00000000200001c0 RSI: 0000000000000004 RDI: 0000000000000007 [ 366.587231] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 13:56:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xae, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000013c0)={0x29, 0xffffffffffffffff, 0x1000, 0x0, @scatter={0x2, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/64, 0x40}, {&(0x7f0000000200)=""/146, 0x92}]}, &(0x7f0000000380)="feb13288cf89b04fd552dcffb201d547e93bd04a8f1e6edf57eee676b49fe22c37a5aec486281736a412cfc561de42d6d815557e708034dee9945fc659f7c43474cf8a696339d9996fa5e6922c541ff3dcb38e37405ac6e5e511ca5fc87a73ea433ed3f22826d6d9013a9f74d8691fad8790b5169688991f3cee7f59ec5ac3894eead271d9b1b750bb6e0d577a47070f50585f968d7172e809f3156393cf6ceb7791c0c93c8dbde9e9fd842540da5ba5f918bb1ccbb69049c501277b9888d6c4748d340847ec37106506cc35f576fc670fcb151f4326e82090db089b3acc736833ec078baad00fc03604ad9f8e1f5bbae0277c60aad90c5afa0f165c46ff05820d800033e0c585fa6f06be023b9afb2c72439f4f2c567a2b4aed222d6024cb95d8c179e09a652ec76445bdac805d3e9793be0e42099ddfa03e6d8188f539f3c4c25775c93993936578d974596ad888869b22c03b656e33a98e16e8ef5d1b29ef1169ef561dabd879ac201edb5fe61deded41da2aa4b91d810bb2a5cf07de262ac04226ee699316ed1394ab22f57d1fdef5e176bbd132ad06fd99a71dae63f1eacab1e1883157f54bc6ff1645ab67d0b51dd4ec4b029c59a8b13573e7aab4504574ea46b830857eb747183609eb25e119486cfbd23403c61ea4c2d99b6b6c9b7acb0a563ff2472652b855c94a9d3b32f608f65087235cb70e732b521f996b441f2b69aa8cc76d7a386d7ea88a39deaa1b84bc33a540d9fc802e1cbae52c385420a819e8a88d569fe611f57e4088773b3b3f2bd74ee13399219419ba24d584f0dc186610c6478adfbeb8a8824735416564719afcee62fb0b70a5b5a8065facf08738cdaa90c516be08fb6b159bf03362122be2b47e748c8a30689396d37b411355939c056052bcf0c293da7706ae4ab5fe3f15c0976e9d72ff82735a041abab193ad7f4adaf5aacb1dabe32bd471ce56cd9d58e922e2f73cda5c915fdebf1f5113f4f0c61471d9765be350a94b50c961d7d62900dd41c9a4baa6c6712263afaf2f041aded584eb54828cb21953e3737bebd32ba0e4b065303045cdb85c1a0927a987c9bf8c14e046a10cf85192f9f5113e37e786754357b7403995fa40130fa21ea9b9c47a9177e96187fb51b05b299f63ebbd392bcf757730c21990b90cfbdf6f2846b7821ff0f4d02541b94843303fd10495c6baa054e5dacecf05c9473ac373e571cedcb3e8f57a7664b7e4a15ad963cad71cd6e63f4108f61e9976c0bcc83bd3a4c34ee3a354ef76253f1731bad9a714a1de0efe325c2f3015636c40a20e7756b4dff92a0102ead8f6cdc4dda2404cb66dbab04828545a3393d289ef9abe68378caf07cebb71e9fa7b6dbfc5dd0d3f54cf1a6bcd8f5b810d881fb12976f32219fc18697057b7b84e51e9669f828da4107bd6af0731f2511b34cfc8b7d45d459cb5b3d13ba5b0f72f5c1264c4eabf447e7314c2286d89f7d67fdffb47493b85287da0b6fac10ffe586f9fe666f429eb8ba48bf87e58958d246096bd1cf7a46b6e42fc2b73f6c730858b642ef43ff2e86578cedaded6ff68fb776153b4884f6a3aae218e271b8c5258765a3ea8f156482f18160fb6af6924973149e41cf57b827cb380a92d862652fd755e22edfbf70766aaf3a4827dc5e8093049149b2196f20d24672699def115d8b25c99aea607801252a342f53672a8a080fd2c71cd2a791a60fe7fc6073150c5492fc3bd52ade94beb0a249358ebd97d904ee801d932a0db5a2f6d27be51ef5c858fcdfcde753337d9938607e3563a2ba956032051163a235b55cb5ad34e9d34470840970ea1fa9e86d796c9787f0d888f3bd28316fdb3354488869c9fc86c4780cb30c5a92111af285ae1809f7cb6c5ca92029516242e0569790fe4d2da22403db4793098e277960f26ad90a4260dfe3ee87e371be97ab12504e2bb24770c604d0a5b49c5c68652c12365e6df5bc5e852b76d4e4b0f0001f393a887a011f01fe8e1a50ebc59673fb5df501fa5b6e86c8d2e6b1ecc6a1f4e1d2d1295764dea2ac3788d45daf29a87d4de087a7eb8bfe5dd7ca4d47219ecf1e12f572aebb0e80d58649e874b31f4513736e5bf070f286e5fbfef7f868d818e0e3aeec7e74861ffbda77fa2da814741ba692ea083ed8204c0f2d0700b56cce817d3be880ace2f31f96d33a6619ecca8de0b9ef4ae2d823107d1f8db5576d9864d8da5513b617a88f64e00af9055528350af5515f820d6f56732f4a7b8cb3b0dc892cb393857ca08af30318523ba35a9dc198141d623f6560f066b4e8dde7f2c49e16153409b566910a3ac69f76067eec6e82d50441b4e8c404851a4844bee04f2771d26f5ddb43487391e6278369aa48dec11001d2e3551b6a6fd9cb227c7a93ce15246e7d53c74d0bc23aa10b4cf971cf80be895de49628b172c1594452d49a862062306d11036401c24952bba490408f0e507940f4719563c819303cdada8d2e1646ce55a0c9dcc81acea778ef42c81b2bc6b8cd0529249d243a139cc8f6ba9e0020c9199c635615aa077778b681e8c59c8f4fbb36eaf2e25df01d0dbb92da65dd1a625fef3cb60cb8e4a893fc1c4917220fe3c14df0ad7de4fdae23131acb3bdd61467e77c5b84352fd31cec0315a14e99af8f7383735eb351839c5dde90ffa773549074583e5f4f9d7af0887c0504dfaad9d34e24e5a5e227c266ab96ab764c85cc19b163cf57710efbc696fa165ed3f8bca3aca37ec689cf3486a63c041e9cd0e3da3f6e73052fd6957e29bed6cfea71f76df4d37b5c4ff43f948b66f49cffb32f60a13f966ce660f2dc1a97ef6c0e49e57ecbb963eeae6b70a52bbc3d97b0778518852e30fbfc4a3dec6a0d638722000922cec69acc389f795496dc1159934833b977fb160ad6171d94d453634ab15a80c4517ea3b1052e1290637c4a4ee384b3a5e4c0c713ccad2a32c52cf0638c1dd9b54d6c538b4f4b15d80acdd0fe7f3908479e139cb257812a5b2972eb15e15e5a02eaeb3d4d55a53a29e9d51ae860d7a47dbea47ce19259b3226906bc9b9e9b228212a55f10582bf3f0c90fca92a931e53b4dd71a34a592b718b92ee65bcc627dedefa6ca014c18c6c601a4c2a82a0c31146db453aff80ff2efbb50181ea0dea706d1967d79717e6473fe5608b7313db292c35ee41e09b8eba0fb792cdcc950f74baf2e80dfbe8be53dca1e8a668a353ec33300409d0d10e3a63fd04929a9b094b34ed6e4d7f898fd65b4134a44da69e8de5f429656efe3b02d242ef90a647cdd1202da872d37ecab63c21dfcc651d46052d588bfc0d69a5acdda68853a33ea18c3edfe17039460b0f8e06dfed1c7f80333c2eb39d4373ac2a3cc364f83bbeac6d999315c6ef5f8bbf6ea951bcb18edeff4c81f4d97eecc1cc692076173b154d358ec6ed3a2c0932a8edb96ad1a6d44c12076de062b9fa2b433b28ea03cb3a86dfa1b58aef9838074e94966e1a331e0ca64694a2bff311f35b3c916451142d99ca498e11306007cac4fcd4b50c092f46e1b5e0ff5cd17eb6eecf0035ae7620b1100b7a903c745cc1f9636a7ef78619669a9ae7e86f1edb9527b38e07d5d5f46d8eb67b1c7ca6c429789e344efe6fa8c8bd422c1db14ad8e1726238be334b6d1d7ddb1da9fe64a2f773b9319caf9bd93dd7f5299476e8d29c8c6fab18a0a0f36532c0b39776d2b463f8589170035b2b9039df11ef9134ed24d1b0543f521d2d01bd1fa5cb77274b08f5880de8fe3cbeea43ed4af3b3386138c8f4a4edfcd2599b241726cd152c6015d8042dc5644f765f9b718b382a04feac6f0bbcbfa393746fa0f8dc9695676b47bbe01838d2076bbef0c0eb70a057baedb9d5b357bc2028ce2b450a79880a46b481e88e4ffa5e9e7565b4814c3a560b49e15568ae7ef5cb47780c1be1f4df80bdc38fbba96041848475ed8d1dea959fde5d8c51c02bbdadf83584f7880d209b480531ffb89a76a905b459fba61c0da5e3152dafb628fc4a1925c6a9f3b4c931102167d2b42147268649a3c95f9a99e36cf73b5c0f59449b5df8cadd37905f9726693e5841814404efa872d4cd6847d0eed7f56d341a9e5466d5173d6f5f2ac4c37012e4f88cf8bbaaf7a1391b3a75525deb38779e8f360a801a7185bdc732031774ead471530a286eb88c9322ca7ed20ce37e8c7178a2e1028e7b530b7170000e2a65eb99dc2313a7abcfac79ea191385748f55006480b3d94893d6b2600fe36a4c632770094b0f180aad39d3e864cc131db26e957b1fabd3f43c91bb783388b4279ac03a554341dd5ee5fc8e9bef0ad3f8fc69cf749ac864362b787cb6229cde62f3ea7c0349ca443eda37a78b1f13f68496a650dcc810734f327b2c1623c86aeff9e2abcf48432bdf16c606c533801fef319d713a51f83691b443f5c3f75bdcd051aa439572ab25e8d0a33c467bf4ced9f7462e2775a183a6138f41643c61498d0c345b93b35701b8f134feba381c4725a8c11843ea162976155b377fed6cc6172cd5173a6873d2853415fc96a9ce8f771ff37512567f5b2f6c2409f58ee2da6584fe8fdc94332ad1a05af4406e94d1be8ea53db6f934c0c7419b23913522090d7278434d137af7b6839799eac148ac6ef141245262d6333f316a4f00488aa4174b77c2d4f16f47458f64cbb076efe7bfe44a63cdd9a2e2d63b8c91e5f726c6c401254bc6e049b935119c28c4610056a4264ba69c2c07f5994943cfb1c1d3a5df02e690af7b3d8637d07ea572116da9c048a851a18a8fbb37eaf8cad655f1439f9aeafdb2cee66e241ed22e9b63d5b9592221c601336ad0bad068b06ce1c3f9f0d9afd0a4d07b55ed91c99b5f0a1f86773cc26d47dddc8cc852e4f9c7eb484daf086cf25f6a705fdd3f64f5c1535a63f1632c3e6bc5b66cad626ba65c3dd037bdcf6174b9174617ce04299c41c66dcacfc2b9091e210b18321f1faa1f052214f4a387223662a42c72005cc598e3931d417510f77947a395693c416ecbede8bd973362a42e7ac19ecfc25434cdd2556e1293cce065c5f3fdb2a88ae63bc0751a5d9b7e2686d1815ea282a566ab097cab46191189cc7ab9925d1bc40c38b7db4cb9dba644e1ab4412a2c32d3c347de4f1583da861a05b4f21b2d99bf6e90ac595348072fda4e357ee91247994b9e129ea30095a5f888b331c89ac8b9841383248ad439e251fdb87a9baf287e3cf70d84890972a7ca8b553ca9858cddfcf17750f7069e881a58b09bb939e59ba3d480b377f4c89975457a10204113538fd2d202ac5abb6b1a106fbaf3d409eb22240fcba2ef3fd98fa6aaaec3b5d459dc8b31ffad7042e5ccc6522b409771dd9e23b5c57cdc5bbcb0c4c8c1a31dd37ccb305b9aa3a169c4b6ffd2a28d97f38d8089a7d5fdd9ab874faadd5f0fae3dc49b3a0acbaf30113998498f0d59e1d9ccb44d0a233a8f2d9351fbba248903da646abdd028a1dbe5c5ead47626025e4a5becd71543a3e0afff8a7c7ee73440d022d84bf11fc3cdff08d531f9284a127955c6dc8f285798ef440c757c63e1a1dc66f8be0a7edeb6545213fd234682e25c55009418ee66ee8ea3a5117c120f2feb239b59326b75b7737d9e7d63b8bab170e4fe12cb1354818cb8a0c354641a69c5930002e9baac25a4a3c563ab5d520e64fd09cc2d6895ce771c7f51be7b67fa5f10ba3e63afd83ced4927975c0888df4f894a7e83997379961762aa8e1fb16fe70e5b52a790b502ac81b358c9c6959a6c309200d69bb1d6644f8111659c78b35258505e8d23b2f4f1f6", &(0x7f0000000140)=""/11, 0x2, 0x24, 0x1, &(0x7f0000001380)}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0x40000000}, 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_open_dev$ndb(&(0x7f0000001440)='/dev/nbd#\x00', 0x0, 0x100) sendfile(r2, r3, &(0x7f0000001480), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x400) 13:56:34 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000200)='cp\x19Mi\xb9\x91\xc7-\x98_h`rdwall\x00v\x18\xdc2\x86\xfe\xca\x1c\x89\x88\x8293}\xf5\x165\x9c+C\v\v\xd3\xc5\x95\xaau\x14\xc8\xcd\xe7\xabdL\xd1\xfc\x81\xf0\x8d\n}\r\x0f\xc9\xa7:\xf9{\x84Zt', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 366.594514] R10: 000000010a000d02 R11: 0000000000000246 R12: 00007fcaf3afa6d4 [ 366.601795] R13: 00000000004c721c R14: 00000000004dca50 R15: 0000000000000008 [ 366.630115] net_ratelimit: 16 callbacks suppressed [ 366.630120] protocol 88fb is buggy, dev hsr_slave_0 [ 366.640221] protocol 88fb is buggy, dev hsr_slave_1 13:56:34 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:34 executing program 0 (fault-call:5 fault-nth:3): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 367.128915] FAULT_INJECTION: forcing a failure. [ 367.128915] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 367.157422] CPU: 0 PID: 15931 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 367.164493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.174051] Call Trace: [ 367.176667] dump_stack+0x138/0x197 [ 367.180316] should_fail.cold+0x10f/0x159 [ 367.184507] ? __might_sleep+0x93/0xb0 [ 367.188422] __alloc_pages_nodemask+0x1d6/0x7a0 [ 367.193116] ? __lock_is_held+0xb6/0x140 [ 367.197195] ? __alloc_pages_slowpath+0x2930/0x2930 [ 367.202229] ? rcu_read_lock_sched_held+0x110/0x130 [ 367.207269] alloc_pages_current+0xec/0x1e0 [ 367.211613] push_pipe+0x3cb/0x780 [ 367.215182] iov_iter_get_pages_alloc+0x4fc/0xef0 [ 367.220050] ? iov_iter_revert+0x9c0/0x9c0 [ 367.224305] ? iov_iter_pipe+0x9f/0x2c0 [ 367.228301] default_file_splice_read+0x17c/0x7b0 [ 367.233158] ? __kmalloc+0x15d/0x7a0 [ 367.236884] ? alloc_pipe_info+0x15c/0x380 [ 367.241127] ? splice_direct_to_actor+0x5d2/0x7b0 [ 367.245982] ? do_splice_direct+0x18d/0x230 [ 367.250321] ? do_syscall_64+0x1e8/0x640 [ 367.254453] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.259843] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 367.264963] ? trace_hardirqs_on+0x10/0x10 [ 367.269215] ? trace_hardirqs_on+0x10/0x10 [ 367.273482] ? __lock_is_held+0xb6/0x140 [ 367.277557] ? save_trace+0x290/0x290 [ 367.281387] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 367.288072] ? fsnotify+0x11e0/0x11e0 [ 367.291894] ? __inode_security_revalidate+0xd6/0x130 [ 367.297101] ? avc_policy_seqno+0x9/0x20 [ 367.301178] ? selinux_file_permission+0x85/0x480 [ 367.306042] ? security_file_permission+0x89/0x1f0 [ 367.310989] ? rw_verify_area+0xea/0x2b0 [ 367.315062] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 367.320181] do_splice_to+0x105/0x170 [ 367.323995] splice_direct_to_actor+0x222/0x7b0 [ 367.328679] ? generic_pipe_buf_nosteal+0x10/0x10 [ 367.333540] ? do_splice_to+0x170/0x170 [ 367.337529] ? rw_verify_area+0xea/0x2b0 [ 367.341609] do_splice_direct+0x18d/0x230 [ 367.345769] ? splice_direct_to_actor+0x7b0/0x7b0 [ 367.350676] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 367.355447] ? __sb_start_write+0x153/0x2f0 [ 367.359785] do_sendfile+0x4db/0xbd0 [ 367.363531] ? do_compat_pwritev64+0x140/0x140 [ 367.368128] ? kasan_check_write+0x14/0x20 [ 367.372380] ? _copy_from_user+0x99/0x110 [ 367.376544] SyS_sendfile64+0x9d/0x110 [ 367.380445] ? SyS_sendfile+0x130/0x130 [ 367.384428] ? do_syscall_64+0x53/0x640 [ 367.388417] ? SyS_sendfile+0x130/0x130 [ 367.392407] do_syscall_64+0x1e8/0x640 [ 367.396303] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 367.401166] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.406366] RIP: 0033:0x459a29 [ 367.409556] RSP: 002b:00007fcaf3af9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 367.417297] RAX: ffffffffffffffda RBX: 00007fcaf3af9c90 RCX: 0000000000459a29 13:56:35 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, 0x0) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000000)={0x3, {0x6, 0xffffffff, 0x7ff, 0x4}}) [ 367.424579] RDX: 00000000200001c0 RSI: 0000000000000004 RDI: 0000000000000007 [ 367.431853] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 367.439130] R10: 000000010a000d02 R11: 0000000000000246 R12: 00007fcaf3afa6d4 [ 367.446407] R13: 00000000004c721c R14: 00000000004dca50 R15: 0000000000000008 [ 367.460476] protocol 88fb is buggy, dev hsr_slave_0 [ 367.465580] protocol 88fb is buggy, dev hsr_slave_1 13:56:35 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(0xffffffffffffffff, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) 13:56:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x448080, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000180)={r3, r4}) r5 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r5, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:35 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:35 executing program 5: getpid() r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) syz_open_procfs(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000080)={0x74, 0x0, [0x200, 0x3ff, 0x3ff, 0x5]}) 13:56:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc001001, 0x10a000d02) [ 367.750137] protocol 88fb is buggy, dev hsr_slave_0 [ 367.755265] protocol 88fb is buggy, dev hsr_slave_1 [ 367.760096] protocol 88fb is buggy, dev hsr_slave_0 [ 367.765397] protocol 88fb is buggy, dev hsr_slave_1 13:56:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:35 executing program 0 (fault-call:5 fault-nth:4): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:35 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 367.984260] FAULT_INJECTION: forcing a failure. [ 367.984260] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.009882] CPU: 1 PID: 15976 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 368.017467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.026833] Call Trace: [ 368.029442] dump_stack+0x138/0x197 [ 368.033110] should_fail.cold+0x10f/0x159 [ 368.037269] ? __might_sleep+0x93/0xb0 [ 368.041171] __alloc_pages_nodemask+0x1d6/0x7a0 [ 368.045849] ? __lock_is_held+0xb6/0x140 [ 368.049915] ? __alloc_pages_slowpath+0x2930/0x2930 [ 368.054946] ? rcu_read_lock_sched_held+0x110/0x130 [ 368.059979] alloc_pages_current+0xec/0x1e0 [ 368.064318] push_pipe+0x3cb/0x780 [ 368.067875] iov_iter_get_pages_alloc+0x4fc/0xef0 [ 368.072742] ? iov_iter_revert+0x9c0/0x9c0 [ 368.076992] ? iov_iter_pipe+0x9f/0x2c0 [ 368.080991] default_file_splice_read+0x17c/0x7b0 [ 368.085843] ? __kmalloc+0x15d/0x7a0 [ 368.089563] ? alloc_pipe_info+0x15c/0x380 [ 368.093805] ? splice_direct_to_actor+0x5d2/0x7b0 [ 368.098656] ? do_splice_direct+0x18d/0x230 [ 368.102999] ? do_syscall_64+0x1e8/0x640 [ 368.107073] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.112452] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 368.117564] ? trace_hardirqs_on+0x10/0x10 [ 368.121812] ? trace_hardirqs_on+0x10/0x10 [ 368.126056] ? __lock_is_held+0xb6/0x140 [ 368.130655] ? save_trace+0x290/0x290 [ 368.134473] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 368.141147] ? fsnotify+0x11e0/0x11e0 [ 368.144954] ? __inode_security_revalidate+0xd6/0x130 [ 368.150150] ? avc_policy_seqno+0x9/0x20 [ 368.154218] ? selinux_file_permission+0x85/0x480 [ 368.159074] ? security_file_permission+0x89/0x1f0 [ 368.164023] ? rw_verify_area+0xea/0x2b0 [ 368.168092] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 368.173208] do_splice_to+0x105/0x170 [ 368.177038] splice_direct_to_actor+0x222/0x7b0 [ 368.181723] ? generic_pipe_buf_nosteal+0x10/0x10 [ 368.186574] ? do_splice_to+0x170/0x170 [ 368.190561] ? rw_verify_area+0xea/0x2b0 [ 368.194628] do_splice_direct+0x18d/0x230 [ 368.198781] ? splice_direct_to_actor+0x7b0/0x7b0 [ 368.203638] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 368.208407] ? __sb_start_write+0x153/0x2f0 [ 368.212746] do_sendfile+0x4db/0xbd0 [ 368.216477] ? do_compat_pwritev64+0x140/0x140 [ 368.221074] ? kasan_check_write+0x14/0x20 [ 368.225319] ? _copy_from_user+0x99/0x110 [ 368.229482] SyS_sendfile64+0x9d/0x110 [ 368.233388] ? SyS_sendfile+0x130/0x130 [ 368.237371] ? do_syscall_64+0x53/0x640 [ 368.241358] ? SyS_sendfile+0x130/0x130 [ 368.245342] do_syscall_64+0x1e8/0x640 [ 368.249236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.254096] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.259290] RIP: 0033:0x459a29 [ 368.262477] RSP: 002b:00007fcaf3af9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 368.270190] RAX: ffffffffffffffda RBX: 00007fcaf3af9c90 RCX: 0000000000459a29 [ 368.277466] RDX: 00000000200001c0 RSI: 0000000000000004 RDI: 0000000000000007 [ 368.284744] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 368.292022] R10: 000000010a000d02 R11: 0000000000000246 R12: 00007fcaf3afa6d4 [ 368.299298] R13: 00000000004c721c R14: 00000000004dca50 R15: 0000000000000008 [ 368.307102] protocol 88fb is buggy, dev hsr_slave_0 [ 368.312223] protocol 88fb is buggy, dev hsr_slave_1 13:56:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:36 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(0xffffffffffffffff, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r1 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r2, 0x1, 0x0) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r3, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r1, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r4, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r4, 0x2284, 0x0) 13:56:36 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000240)={0x8000, 0x10001, 0x9, 0x1000, 0x6}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xc9, "03c315c911686584dd64936e6bfd9dc6860718ca119b621e223015dd89a90561bf5415a310cd3b638dbac75cab44ca1adc8c1bb0774eac146c413b1ebfc5f9ff84efb8755996d299ea25d545401eb2789d44029e49b1efa1c9a09235b2a1aec7ed07fa791271dfce900ff0ee7b5ae216133f93f19b35e028df7096d1c4f6fa69e5343e82029e3b33dd51cfb44cca5b0faad234e27734c14330fcdc063ad2bdc306a1d20047c8aa27ac2dc8bc4f30767bd61e99a0d645168de6ed8f43c397169ac20026d917a8adfdd5"}, &(0x7f0000000100)=0xd1) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x7a7ec0c351f38a0e, 0x0) set_tid_address(&(0x7f0000000280)) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000200)={'bcsh0\x00', 0x8000}) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={r4, 0x9, 0x1f}, 0x8) 13:56:36 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:36 executing program 0 (fault-call:5 fault-nth:5): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j\rQ%\xa9\x02\xf9\xb5\x89I\xb3I\xe6`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) r2 = socket$bt_hidp(0x1f, 0x3, 0x6) sendfile(r1, r2, &(0x7f00000001c0), 0x10a000d02) [ 368.823953] FAULT_INJECTION: forcing a failure. [ 368.823953] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.854981] CPU: 1 PID: 16010 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 368.862044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.871405] Call Trace: [ 368.874013] dump_stack+0x138/0x197 [ 368.877653] should_fail.cold+0x10f/0x159 [ 368.881812] ? __might_sleep+0x93/0xb0 [ 368.885706] __alloc_pages_nodemask+0x1d6/0x7a0 [ 368.890380] ? __lock_is_held+0xb6/0x140 [ 368.894445] ? __alloc_pages_slowpath+0x2930/0x2930 [ 368.899470] ? rcu_read_lock_sched_held+0x110/0x130 [ 368.904497] alloc_pages_current+0xec/0x1e0 [ 368.908830] push_pipe+0x3cb/0x780 [ 368.912382] iov_iter_get_pages_alloc+0x4fc/0xef0 [ 368.917234] ? iov_iter_revert+0x9c0/0x9c0 [ 368.921474] ? iov_iter_pipe+0x9f/0x2c0 [ 368.925457] default_file_splice_read+0x17c/0x7b0 [ 368.930301] ? __kmalloc+0x15d/0x7a0 [ 368.934015] ? alloc_pipe_info+0x15c/0x380 [ 368.938270] ? splice_direct_to_actor+0x5d2/0x7b0 [ 368.943115] ? do_splice_direct+0x18d/0x230 [ 368.947462] ? do_syscall_64+0x1e8/0x640 [ 368.951527] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.956898] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 368.962004] ? trace_hardirqs_on+0x10/0x10 [ 368.966241] ? trace_hardirqs_on+0x10/0x10 [ 368.970485] ? __lock_is_held+0xb6/0x140 [ 368.974547] ? save_trace+0x290/0x290 [ 368.978359] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 368.985029] ? fsnotify+0x11e0/0x11e0 [ 368.988835] ? __inode_security_revalidate+0xd6/0x130 [ 368.994028] ? avc_policy_seqno+0x9/0x20 [ 368.998095] ? selinux_file_permission+0x85/0x480 [ 369.002946] ? security_file_permission+0x89/0x1f0 [ 369.007878] ? rw_verify_area+0xea/0x2b0 [ 369.011950] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 369.017056] do_splice_to+0x105/0x170 [ 369.020864] splice_direct_to_actor+0x222/0x7b0 [ 369.025538] ? generic_pipe_buf_nosteal+0x10/0x10 [ 369.030385] ? do_splice_to+0x170/0x170 [ 369.034367] ? rw_verify_area+0xea/0x2b0 [ 369.038430] do_splice_direct+0x18d/0x230 [ 369.042579] ? splice_direct_to_actor+0x7b0/0x7b0 [ 369.047428] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 369.052185] ? __sb_start_write+0x153/0x2f0 [ 369.056521] do_sendfile+0x4db/0xbd0 [ 369.060255] ? do_compat_pwritev64+0x140/0x140 [ 369.064843] ? kasan_check_write+0x14/0x20 [ 369.069091] ? _copy_from_user+0x99/0x110 13:56:36 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000080)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000200)={0x0, 0x409, 0xbf4d, &(0x7f0000000100)=0x200}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000280)='cpuset.memory_migrate\x00', 0x2, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r4, r3, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) [ 369.073256] SyS_sendfile64+0x9d/0x110 [ 369.077149] ? SyS_sendfile+0x130/0x130 [ 369.081124] ? do_syscall_64+0x53/0x640 [ 369.085106] ? SyS_sendfile+0x130/0x130 [ 369.089094] do_syscall_64+0x1e8/0x640 [ 369.092988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.097848] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.103040] RIP: 0033:0x459a29 [ 369.106256] RSP: 002b:00007fcaf3af9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 369.113970] RAX: ffffffffffffffda RBX: 00007fcaf3af9c90 RCX: 0000000000459a29 [ 369.121247] RDX: 00000000200001c0 RSI: 0000000000000004 RDI: 0000000000000007 [ 369.128525] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 369.135807] R10: 000000010a000d02 R11: 0000000000000246 R12: 00007fcaf3afa6d4 [ 369.143091] R13: 00000000004c721c R14: 00000000004dca50 R15: 0000000000000008 13:56:37 executing program 5: r0 = getpid() ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000000)={{0x2, 0x1, 0x10001, 0x2, 0x6}}) syz_open_procfs(r0, 0x0) 13:56:37 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:37 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:37 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x5, 0x9c9}) ptrace$setregs(0x8b605fa46cc7be73, 0xffffffffffffffff, 0x3, &(0x7f0000000000)="c36e0f01d99f0d38a2c7b499c26566b8b6f9304c7f98cdc34800eb4063268ef2715433b635db99") 13:56:37 executing program 0 (fault-call:5 fault-nth:6): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 369.653624] FAULT_INJECTION: forcing a failure. [ 369.653624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 369.698757] CPU: 1 PID: 16044 Comm: syz-executor.0 Not tainted 4.14.146 #0 [ 369.705824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.715187] Call Trace: [ 369.717814] dump_stack+0x138/0x197 [ 369.721456] should_fail.cold+0x10f/0x159 [ 369.725607] ? __might_sleep+0x93/0xb0 [ 369.729501] __alloc_pages_nodemask+0x1d6/0x7a0 [ 369.734180] ? __lock_is_held+0xb6/0x140 [ 369.738269] ? __alloc_pages_slowpath+0x2930/0x2930 [ 369.743299] ? rcu_read_lock_sched_held+0x110/0x130 [ 369.748333] alloc_pages_current+0xec/0x1e0 [ 369.752686] push_pipe+0x3cb/0x780 [ 369.756245] iov_iter_get_pages_alloc+0x4fc/0xef0 [ 369.761104] ? iov_iter_revert+0x9c0/0x9c0 [ 369.765346] ? iov_iter_pipe+0x9f/0x2c0 [ 369.769331] default_file_splice_read+0x17c/0x7b0 [ 369.774182] ? __kmalloc+0x15d/0x7a0 [ 369.777904] ? alloc_pipe_info+0x15c/0x380 [ 369.782153] ? splice_direct_to_actor+0x5d2/0x7b0 [ 369.787002] ? do_splice_direct+0x18d/0x230 [ 369.791336] ? do_syscall_64+0x1e8/0x640 [ 369.795441] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.800822] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 369.805939] ? trace_hardirqs_on+0x10/0x10 [ 369.810184] ? trace_hardirqs_on+0x10/0x10 [ 369.814433] ? __lock_is_held+0xb6/0x140 [ 369.818502] ? save_trace+0x290/0x290 [ 369.822324] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 369.828996] ? fsnotify+0x11e0/0x11e0 [ 369.832805] ? __inode_security_revalidate+0xd6/0x130 [ 369.838003] ? avc_policy_seqno+0x9/0x20 [ 369.842077] ? selinux_file_permission+0x85/0x480 [ 369.847032] ? security_file_permission+0x89/0x1f0 [ 369.851977] ? rw_verify_area+0xea/0x2b0 [ 369.856047] ? page_cache_pipe_buf_steal+0x2f0/0x2f0 [ 369.861162] do_splice_to+0x105/0x170 [ 369.864971] splice_direct_to_actor+0x222/0x7b0 [ 369.869657] ? generic_pipe_buf_nosteal+0x10/0x10 [ 369.874514] ? do_splice_to+0x170/0x170 [ 369.878497] ? rw_verify_area+0xea/0x2b0 [ 369.882568] do_splice_direct+0x18d/0x230 [ 369.886727] ? splice_direct_to_actor+0x7b0/0x7b0 [ 369.891582] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 369.896344] ? __sb_start_write+0x153/0x2f0 [ 369.900675] do_sendfile+0x4db/0xbd0 [ 369.904403] ? do_compat_pwritev64+0x140/0x140 [ 369.908997] ? kasan_check_write+0x14/0x20 [ 369.913243] ? _copy_from_user+0x99/0x110 [ 369.917401] SyS_sendfile64+0x9d/0x110 [ 369.921295] ? SyS_sendfile+0x130/0x130 [ 369.925289] ? do_syscall_64+0x53/0x640 [ 369.929277] ? SyS_sendfile+0x130/0x130 [ 369.933265] do_syscall_64+0x1e8/0x640 [ 369.937159] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.942019] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.947213] RIP: 0033:0x459a29 [ 369.950406] RSP: 002b:00007fcaf3af9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 369.958117] RAX: ffffffffffffffda RBX: 00007fcaf3af9c90 RCX: 0000000000459a29 [ 369.965393] RDX: 00000000200001c0 RSI: 0000000000000004 RDI: 0000000000000007 [ 369.972671] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 369.979949] R10: 000000010a000d02 R11: 0000000000000246 R12: 00007fcaf3afa6d4 [ 369.987230] R13: 00000000004c721c R14: 00000000004dca50 R15: 0000000000000008 13:56:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000100)=0x8) r2 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)=""/4096, 0x1000) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r4 = request_key(&(0x7f0000000400)='dns_resolver\x00\x89\xce\xd8\xf9\xa6\xda\xe1\xde\xe6<\xca\xa3o:\x7f\xc7q\xcds\x81\xd6\xc2\x14X4B\xe0\xfa\xa1\x849\xc6\xa4\x84\x9c7y\xa9\f;\xf4\a=\xea\xf9\a\xa3\x18\x9d\x94 (\xad\x8c\xa9P>\xe0\x8e\xb6\x00\x9f\xdc_\xaa\x93\xe2\xdd\xbd\xd8G\xc2\x1d\xf1V\xc2', &(0x7f00000003c0)={'\x00', 0x0}, &(0x7f0000000480)='.\'eth1wlan1\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='wlan1mime_typesystem!\x00', 0x0) r5 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x244080, 0x0) ioctl$TUNSETPERSIST(r6, 0x400454cb, 0x1) keyctl$invalidate(0x15, r5) add_key$keyring(&(0x7f0000000040)='keyring\x00', 0x0, 0x0, 0x0, r5) r7 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000014c0)="6ec7775980a060987db41f614a1e0a0cc4bddb53ba7816c01b9f2f5370fe722230d2b7d5a64c636d3f0917eea2fa1ef0ce5f64723a60143c0880bd846414ce434aede4b1c8ed6ad80dc9ed51c7e3ce92c1aaa6469e4e5f809d9769319ca6a198697294cc6fe7294a50766273101b5cbe0c0b27fdab7242553646e111f3d87d588f", 0x81, r5) keyctl$reject(0x13, r4, 0x8, 0x47, r7) 13:56:37 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:38 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, 0x0) getsockopt$rose(r1, 0x104, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)="53b29e0281629c4f4c89b46aa8ee21b6ee81db17ab159468f6da1f72349619b183dc086866f7a12f1f6b9b489357f3fe9426696310b98152a2807fd79b8390045075d22f6e45e5641e5f964223de412c482b57d13ad5f6c380bac6810deb06b004561349e725d1c5acb3e208d3895389354a0c2b5c28da0c4a555c67b427a1ca8ddea8", 0x83}], 0x1, 0x0) write$capi20(r2, &(0x7f0000000080)={0x10, 0x7, 0x41, 0x81, 0x3, 0x1}, 0x10) 13:56:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1aik\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x13f, 0x3}}, 0x20) r2 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.cpu_exclusive\x00xHe\v\xba0\xc4z/-\xf9E\xfd\xa6g\x99;\xad.r\x1c\x83\b|\x009\xa9G=K\x1f\x04u\xe1\xcb\xfb\xa3>\xec\xf4\x02|?\xd3\n\xb0~\x94\xcf\x0f\x04\xbfr\xcc\xa3\xc8JH8%&Hv\x94\xeb\x85F\xab\x12\xd7\xf1\x11\t@=\xe4\x10\r\xed\xa6\xe3', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:38 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:38 executing program 0: timer_create(0x5, &(0x7f0000000100)={0x0, 0x2, 0x1, @thr={&(0x7f0000000300)="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", &(0x7f0000000080)="26f9a23bbb99ca4f45818e64162a55f9fb6bf00a7c74ad53d9a1de16353532799c1e46cd839fb1910c1f9add80914fa10521903a7bee70d85f4e9137"}}, &(0x7f00000002c0)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:38 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) r3 = openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffb, 0x10a000d02) 13:56:38 executing program 5: getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0x5, &(0x7f0000000000), 0x4) 13:56:39 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000100)={0x4, 0x0, 0x1, 0x5}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000200)={0x3f, r4, 0x0, 0x2}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x193) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0xffffffffffffffff) dup(r6) ioctl$TIOCNXCL(r6, 0x540d) r7 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r7, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:39 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 371.910697] net_ratelimit: 14 callbacks suppressed [ 371.910725] protocol 88fb is buggy, dev hsr_slave_0 [ 371.921524] protocol 88fb is buggy, dev hsr_slave_1 13:56:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) getpeername$netlink(r3, &(0x7f0000000080), &(0x7f0000000100)=0xc) [ 372.070150] protocol 88fb is buggy, dev hsr_slave_0 [ 372.075284] protocol 88fb is buggy, dev hsr_slave_1 13:56:39 executing program 5: r0 = getpid() r1 = getpid() sched_setattr(r0, &(0x7f0000000040)={0xc, 0x2, 0x1, 0x0, 0x5, 0xffffffffffffff7f, 0x100000000, 0x1}, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) ptrace(0x8, r1) syz_open_procfs(r0, 0x0) 13:56:39 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:39 executing program 5: r0 = getpid() setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000)=0x2f, 0x4) syz_open_procfs(r0, 0x0) 13:56:40 executing program 5: getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) ptrace$pokeuser(0x6, r1, 0x0, 0x2) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000080)=""/123) 13:56:40 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) syz_init_net_socket$nfc_llcp(0x27, 0x4, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d05) [ 372.470114] protocol 88fb is buggy, dev hsr_slave_0 [ 372.475314] protocol 88fb is buggy, dev hsr_slave_1 13:56:40 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 372.870167] protocol 88fb is buggy, dev hsr_slave_0 [ 372.875316] protocol 88fb is buggy, dev hsr_slave_1 13:56:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='\x00a+\x06\x00\x00\x00\x8a3\xb9f', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.memory_spread_page\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:40 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000080)={0x0, 0x2000, 0x3f, 0x80000001, 0xeb}) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000200)={0x44, 0x37, 0x1, {0x2, 0x9, 0x7ff, r3, 0x26, 'eth0@eth0securityppp0ppp1proccpuset\x84}]'}}, 0x44) 13:56:40 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='trusted.overlay.upper\x00') 13:56:40 executing program 2: semget$private(0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RUNLINKAT(r3, &(0x7f0000000100)={0x7, 0x4d, 0x2}, 0x7) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:41 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x9, 0x402) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x5) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$SIOCRSGL2CALL(r4, 0x89e5, &(0x7f0000000100)=@null) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) sendfile(r5, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x200000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000100)=0xffff, 0x8) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) getpeername$netrom(r3, &(0x7f0000000200)={{0x3, @null}, [@rose, @bcast, @rose, @null, @remote, @netrom]}, &(0x7f0000000100)=0x48) 13:56:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$FUSE_OPEN(r3, &(0x7f0000000180)={0x20, 0xfffffffffffffff5, 0x6, {0x0, 0x1a}}, 0x20) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x100) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000100)=0x5) [ 373.670933] protocol 88fb is buggy, dev hsr_slave_0 [ 373.676509] protocol 88fb is buggy, dev hsr_slave_1 13:56:41 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:41 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:41 executing program 5: getpid() r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpid() r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(r1, 0x0) 13:56:41 executing program 5: r0 = getpid() pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f0000000080)={0xffffffff, "e0cff8f387c6e67da1253e0cd1b1fa328d014e6bbfbbf060ccc59f0a9a657f0f", 0x1, 0x1}) r2 = syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SIOCX25GCAUSEDIAG(r3, 0x89e6, &(0x7f00000000c0)={0x9, 0x8a}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{0xfff, 0x9, 0x0, 0xf3}, {0xffff, 0xab, 0x80, 0x3}, {0x290, 0x20}, {0x401, 0x9, 0x6, 0x80}, {0x9, 0x7, 0xe1, 0x3}, {0x1, 0xac, 0x3, 0x9}, {0x9, 0x7, 0x80, 0x400}, {0x20, 0xa0, 0x20, 0x6}]}, 0x10) 13:56:41 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000080)={0x41, 0x3, 0x3}, 0x10) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) time(&(0x7f0000000080)) write(r1, &(0x7f0000000340), 0x41395527) r2 = dup(r1) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r4, r3, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) bind$alg(r2, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(morus640-generic)\x00'}, 0x58) 13:56:42 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:42 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x7fff) ioctl$KVM_RUN(r1, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) mincore(&(0x7f000003e000/0x4000)=nil, 0x4000, &(0x7f0000000400)=""/156) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000380)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f00000003c0)={r4}) dup(r2) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000140)=""/202, 0xca}, &(0x7f0000000080), 0x8}, 0x20) 13:56:42 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) bind$unix(r2, &(0x7f0000000200)=@abs={0xc0c1d06a1d55d948, 0x0, 0x4e22}, 0x6e) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:42 executing program 5: lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='security.apparmor\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x20, r1, 0x439, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}]}]}, 0x20}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendto$unix(r2, &(0x7f0000000200)="13b369488259cd6c9f0705703ea6e1959d4bb62466153486ed4bde8a63ca9dbf554090fda7d6b637f5d6d2d8ff91a09f25c3481e69068f138e5fe01cc08c08989f19e28a8bc893d09554861973ec4e29e2aa4834e764d46e28ee5f130e6b20ffbf88e93080f358a181eadcc2980241f4e590fb02ac2cfcc8720ebbda3a3fe2e9768d7660ec1d0baee16a6bab672ed5e1bda496c90f8a337c86b213fe77cb052bf9ae68793c4bd2df02202f52bf3d06badd4576a39f98", 0xb6, 0x80048, &(0x7f00000002c0)=@abs={0x3, 0x0, 0x4e20}, 0x6e) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x84, r1, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfb}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0xffffffffffffff40, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x90c9}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x1db, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4}, 0x400c0) r3 = getpid() syz_open_procfs(r3, 0x0) 13:56:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x800, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000200)=""/198) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000100)) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:43 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x42800008}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @local}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x40000) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCSERGETLSR(r4, 0x5459, &(0x7f0000000380)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_dev$vbi(&(0x7f00000006c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r6, 0xc10c5541, &(0x7f0000000700)={0xff, 0x1f, 0x9, 0x0, 0x0, [], [], [], 0xfffffff8, 0xe2}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) dup(r5) connect$l2tp(r5, &(0x7f0000000680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @multicast2}, 0x4, 0x8b, 0x4, 0x4}}, 0x2e) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$cgroup_ro(r8, &(0x7f0000000340)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_int(r7, &(0x7f0000000080)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xfc, r9, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb38}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8eac}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40000}, 0x810) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000400)={0x1d0, r9, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10001}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1d}]}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xf3d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x85}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f80}]}, @TIPC_NLA_LINK={0xc4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa02}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3b5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x1}, 0x1) 13:56:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) r4 = dup(r3) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e1e, @loopback}], 0x10) pipe(&(0x7f0000000540)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000800)=[{&(0x7f0000000240)="75759b024e34208663466f3672de34e463847a1b2a", 0x15}, {&(0x7f0000000580)="e170bc335d0cb429cb50e000bb0d3465862a9b8888eb8dd3e420d1c34647bf9442cb772f1fbf802e1143ee5dfb4abc3b03e157d1f4efb3e8afd2c27344b017e5dc39509de24986e27b5ce8ee0f3baf4a49f961a07a08b58db81fe59b6e0f4dd08b9027c818145d18c7c9d74531b70cd742e63da1adf2129ef4066639357afeea8cfb714152896223c1c5bff5daca3422ab3585553db2bce02366bfe75553d68df299ff112d7955acbe81dd0a8c0a38bc3682e85ad716168e030000006e14d73666a93792d363fc33f0c293201f8322f71c77cd8467483a5b85e6710e30b8e99ae339f9a2af8cf351e01e4172dbec12558f40", 0xf2}, {&(0x7f0000000680)="c6abb81946aa3cac787016b59a1867b53b78003538f9457025dd9b4142019899cdc3beae460727b5dcbcc04d00a201cf68cb454adce2ddd67e64ece00674cc67ab4c47e5d721459ce5d253b5cb3ad03569d3ee6418b942b912e1bccaabecd65e6b8212062f83d1aaa00aa8554c34b1c82b3c36f12f4b8800260af0a1c459a43d38a3c7d43481e9c791626c7c68b740bbb168156e7b34e9f294f27673603a00", 0x9f}, {&(0x7f0000000740)="5862261537273401aa6fc6a090bc237aa3595fbfcf02402b475b42a166015aa6897ff60a29ca6006d574fdf77f8ec0df2326ecc85b172cb05d9831dda394a864fdbecc7f30b37bc0f7ed3033313553c7aba65a3c3b0f9a460d477faff8044e49b745534c385a60df60f15bfc9d671c6d2cb1730b26f716da1b92b1ec918075cc5bdd94b07d66e656", 0x88}], 0x4, 0x0) r9 = socket$inet(0x2, 0x4000000805, 0x0) r10 = socket$inet_sctp(0x2, 0x5, 0x84) r11 = dup3(r9, r10, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r11, 0x84, 0x66, &(0x7f000059aff8)={r12}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000840)={r12, @in6={{0xa, 0x4e21, 0x33, @local, 0x4}}, 0xd26, 0x1, 0xfffffffa, 0xfffffffd, 0x5809971cb4b77128}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r8, 0x84, 0x5, &(0x7f0000000440)={r13, @in={{0x2, 0x4e20, @local}}}, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f000059aff8)={r14}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000080)={0x7ff, 0x18003, 0x707f, 0x7, r14}, &(0x7f0000000140)=0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:43 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:43 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x40, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/net\x00') syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0xb53, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000240)="d5f6d551f887089aaa0c81e98dae396194e04525951e6e03cad2e07c97cec6b78e68c7c3b470b534f8965ca99037c74f89d7fbf3f009c18b398be91609d17fbf30deda00d0bf7562325ba6b3bc6ea92076e20b3ec9e4d274ed9e8d770c704b00c1a808fb91ced789230d4281e0c2d7ef337b742951fc487653abe24da99aba553a6ee97df133c251f7921cef231008a1e95119bee7e2db756f530c", 0x9b, 0xd63f}, {&(0x7f0000000300)="4b243be3e987bb86dff4e7311cfef56f191deb0bf3ce380780bdd761cb675f22bb25ed2cd6c6956bd4b1349bc906ae186a2cc1549ffa6844303a62c71a3c8e1073d3d1e46233ba9decc2ead84f2dba71546db7df2e922f35dfdb82ade470afa863bac5b3ee0cd04dbbb105ba5aeb9e012b758a9723c7715156e9c750d9006ee164bae6c1c4d5a2fbb2c7a69bea575838839b7611c7b74ac864432f3abd47d9fa6acd4d0f5e", 0xa5, 0x6}], 0x0, &(0x7f0000000400)='/dev/kvm\x00') 13:56:43 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffff, 0x100000) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = getpid() syz_open_procfs(r3, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8000, 0x0) 13:56:44 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000280)=ANY=[@ANYBLOB="348fe2fff8b9d3fe30f1471ccf5543000000", @ANYRES16=r1, @ANYBLOB="1b0300000000fedbdf25160000002000070008000200ab31000000000300e7000000000000000c0004000400000000000000"], 0x34}}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) dup(r5) ioctl$SIOCRSGL2CALL(r5, 0x89e5, &(0x7f0000000080)) sendfile(r4, r3, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="0bc3927c3383cd654ed33aab306f9917e830ef78990a7aceafc4fe1c4ae6fa04b44b152472d77e4ba3d0671b9871b033c33ffa2ede5010b6d8830aba7a5e736d53573b3be1d63849bbb29fa472a15ed42a8c26fed616173d590972302df6cc25c37ec159fbe79e6c2d738671e4f133ea116542928fe62738a74690dd725afb0738225dd843921d16e2d9b6d4b47eaa96d5968f793ace4c40c4c944c0f47ca9bd1d71b5cf0088de730f1db86f09589dbe3bf7d993", 0xb4}], 0x1, 0x40) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000240)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:44 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000100), &(0x7f0000000140)=0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) r4 = openat$cgroup_int(r3, &(0x7f00000001c0)='memory.max\x00', 0x2, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000080)=0xc000ffc, 0x10a000d02) 13:56:44 executing program 5: r0 = getpid() r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000001c0)={0x80, 0x7f, 0x1}) r2 = syz_open_procfs(r0, 0x0) fcntl$setpipe(r2, 0x407, 0xff) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) r5 = dup(r4) getpeername(r5, &(0x7f00000025c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000002500)=0x80) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) dup(r7) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000002480)=@filter={'filter\x00', 0xe, 0x6, 0x2124, [0x0, 0x20000340, 0x20000e34, 0x20001900], 0x0, &(0x7f0000000300), &(0x7f0000002640)=ANY=[@ANYBLOB="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"]}, 0x221b) getsockopt$EBT_SO_GET_INFO(r6, 0x0, 0x80, &(0x7f0000000240)={'broute\x00'}, &(0x7f00000002c0)=0x78) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000080)={0x8, 0x2c84, 0x3, 'queue0\x00', 0x1}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$x25(r8, &(0x7f0000000000)={0x9, @remote}, &(0x7f0000000040)=0xffffffffffffffd3, 0x100000) [ 377.030154] net_ratelimit: 16 callbacks suppressed [ 377.030160] protocol 88fb is buggy, dev hsr_slave_0 [ 377.040334] protocol 88fb is buggy, dev hsr_slave_1 13:56:44 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:44 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x10802, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000000}, 0x207, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x1000, 0x70bd26, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x411}, 0x40) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r4, 0x40106410, &(0x7f00000003c0)={0x212, &(0x7f0000000300)="a43cd1206df90060603feb4648327c575f0459aaf17ee5ce7d2ae0545cde699f1d82f494c24bc126688693f6451fe9850cdb02917cceef19ee310ce28231f028e5b1c227d8a3263eec700b9d5ca7f86cc18d9f22e62d924954726312c4a7681b4ebc8b018c3a15e8dc4a7420698ba3c9b99ba60eda32cd7c40bb91fc5d5f4d4f1739533cb49b8ec87c9f3309374771c3a6113fe792e0a0d3394c05741dabcc0fb0209c40347bb55033576cf6aca53bcd763ec87430536816"}) r5 = openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r5, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x42000, 0x4) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r3 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x24e08a266f712d) setsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000200)={@initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8) ioctl$VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f0000000180)={0x3321, 0xa, 0x1, "6c42d944e4b44dab0bee13090d2fe18fda826594211b7322c07c846b1a2012e5", 0xb5315241}) open_by_handle_at(0xffffffffffffffff, &(0x7f00000002c0)={0xa2, 0x8001, "789b85e197ebcdfd6c61595eb44fe582be6cf5708bcc840f5c0631356dbad74ab83b173d133037de51dfc7cddb1cd19a7a68f756b469989e12497dc92cc64d71ae2696218b4ab8473f99c764b8d13dac3571521335b653e2a23d707819ecfddef4384b678b5c48880d1f36e1d65cea52d32ff6c28792436870c7c7252d87fae40c950e886bbb6e8f7b8ef46a176cca89af5381aa69acdc008cf4"}, 0x20000) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xff, 0x4100) ioctl$PPPOEIOCSFWD(r4, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x4, @local, 'ip6_vti0\x00'}}) 13:56:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000140)={0x8, 0xffffff01, 0x7fff, 0x2, 0x401}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$packet(0x11, 0xccea3224ea3a9d09, 0x300) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendfile(r2, r3, &(0x7f00000001c0)=0xc000ffd, 0x0) [ 377.482025] kvm_hv_get_msr: 17787 callbacks suppressed [ 377.482034] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000006 [ 377.512061] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000008 [ 377.520942] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000a 13:56:45 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 377.535837] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000c [ 377.548992] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000000e [ 377.561158] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000012 [ 377.569278] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000014 [ 377.577717] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000016 [ 377.586110] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x40000018 [ 377.594560] kvm [16349]: vcpu0, guest rIP: 0xc5 Hyper-V unhandled rdmsr: 0x4000001a [ 377.602812] kvm [16349]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x17c352 [ 377.613540] kvm [16349]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 13:56:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r3) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x30000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x1fd, 0x0, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:45 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x20600, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000200)={{0xc, 0x9}, {0x6, 0x2}, 0xc082, 0x1, 0x3f}) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000100)={0x80000000, 0x4, 0x1000, 0x6, 0x2, 0x6, 0x1, 0x0, 0x8, 0x5, 0x4, 0x8, 0xfff9, 0x21fb, &(0x7f0000000040)=""/141, 0x7f5a, 0x0, 0x4}) r2 = getpid() pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000180)={0x4, 0x101, r4, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x6}) syz_open_procfs(r2, 0x0) [ 377.830102] protocol 88fb is buggy, dev hsr_slave_0 [ 377.835232] protocol 88fb is buggy, dev hsr_slave_1 13:56:45 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 378.150144] protocol 88fb is buggy, dev hsr_slave_0 [ 378.155327] protocol 88fb is buggy, dev hsr_slave_1 [ 378.310175] protocol 88fb is buggy, dev hsr_slave_0 [ 378.315302] protocol 88fb is buggy, dev hsr_slave_1 13:56:46 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:46 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0xfffffff7}, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r3 = syz_open_dev$char_usb(0xc, 0xb4, 0x1) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000340)=ANY=[@ANYBLOB="0100e300c6cc0fc5ff0b48e88ee6a5d2185a31e42da7817f1b9d4035b8d92d0d70dd1cdbed951e8d80748f5e0c2a02fbb810d76b1dfeb0dd72664ca85161da41127906af7fbf3cc9c1e9b2ccbe95b72a08ec51a487831bca9c0128de1e84b226e81dd6994ef8777bdbd7bdd9d92d10c4a8e2841a1e6d00a7264b8f3b196fab9347edd0000000007b5f52fedda9b504489297e9b423d5df6dad05db8a18fe0f65befc1529fa42e7d04724c9e26ae5f191dc4406080b52d33454fc175f4c862b08fa622c32a54aafde71ae40497dcb656cf6242ecfd72c9ccdf9f97af9206450f4578fca34c061bbdb317a0b3acd777ae64209cef8d8e8bfcac894c75d1ffc86662f5693cb4ba3db9017017dc0984262cf6d112e806df97fa3a5bec9844c65bd5c5dec185f"]) 13:56:46 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000080)=0x1) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x8) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$CAPI_REGISTER(r5, 0x400c4301, &(0x7f0000000200)={0x3ff, 0x4}) 13:56:46 executing program 5: r0 = getpid() r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x40) write$FUSE_POLL(r1, &(0x7f0000000080)={0x18, 0xfffffffffffffffe, 0x8, {0xb4}}, 0xffffffffffffff1b) syz_open_procfs(r0, 0x0) 13:56:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x3e) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x7, 0xcbcf5f8f613e6a16) write(r4, &(0x7f0000000340), 0x41395527) dup(r4) r5 = fcntl$dupfd(r4, 0x406, r2) ioctl$sock_inet_sctp_SIOCINQ(r5, 0x541b, &(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:56:46 executing program 5: r0 = getpid() rt_sigtimedwait(&(0x7f0000000000)={0x3}, &(0x7f0000000040), &(0x7f00000000c0), 0x8) syz_open_procfs(r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x902}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1d0, r2, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4f0a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbc5d}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf0000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x467}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x60cf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x24a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}]}, 0x1d0}, 0x1, 0x0, 0x0, 0x8044002}, 0x20000000) [ 378.720125] protocol 88fb is buggy, dev hsr_slave_0 [ 378.725356] protocol 88fb is buggy, dev hsr_slave_1 13:56:46 executing program 5: r0 = getpid() r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x40240) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x3ff, 0x1, 0x9, 0x401}, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) syz_open_procfs(r0, 0x0) 13:56:46 executing program 5: r0 = getpid() sched_setattr(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x2, 0x0, 0x1, 0xffffffc1, 0x9, 0x2, 0x7}, 0x0) syz_open_procfs(r0, 0x0) 13:56:46 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) write$ppp(r0, &(0x7f0000000200)="ca9dc80fb05d2cef9d21b3f9c1d1d40680e9de4561114d4d8ff49c9250be438db0368854fadd63ab03f82c71b142e079e99f7600b409dbe7e49cd0799322f7003bb43b24565b0dea4085a6de8f6f49d0ad8f211337178848ca2ddb614ef1ae0f4cffa5d7ffccded1b3b3481f633c4f3cc88401b45e0b7e0f66b3ffb9dc05b365b089da36dbefa1c8f8f4353dd5b6574f91783be39520e7876c5db7681df2a52b69280b7d3e0e5ff8a6be41a60fa8cfcbcd5a917ecd84f1cf3886b3b64e73f841c2e53c6984382382da22557a6c4900760802f6cb7f495e9316a47d0d7496a9e8c0d2455192dc30151ce660f096b96699a5b0cb86", 0xf4) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:46 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x7647e23dd3030f38) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000040)={0x0, 0x0, 0x12, 0x0, 0x4}) 13:56:46 executing program 5: getpid() r0 = getpid() sched_setattr(r0, &(0x7f0000000000)={0x30, 0x2, 0x0, 0x0, 0x5, 0x3, 0x2, 0xe1}, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) 13:56:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendto$inet6(r0, &(0x7f0000000000)="a0", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}}, 0x1c) r2 = getpid() syz_open_procfs(r2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f0000000000)={0x9, 0xffffff80, 0x2, 0x10001, 0x4}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f0000000040)='dummy0\x00') [ 378.970879] kvm [16413]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x12653a [ 378.983610] kvm [16413]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 13:56:46 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:46 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000080)='net/raw6\x00') setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000100)={0xbe38fc1}, 0x4) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5, 0x7}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200)={r4, 0x2}, 0x8) 13:56:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000240)={0x6, 0xe0}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395868) dup(r2) r3 = openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_nanosleep(0x6, 0x0, &(0x7f0000000100), &(0x7f0000000180)) sendfile(r4, r3, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x80, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @multicast1}, {0x6}, 0x20, {0x2, 0x4e22, @remote}, 'veth1\x00'}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f00000001c0)={0x9, 0x4, 0x3, 0x8001, '\x00', 0x7c}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r4, 0x0, 0x81, &(0x7f0000000380)={'broute\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000000080)=[{}], 0x0, [{}]}, 0x88) 13:56:47 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 379.753135] kvm [16472]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000020 data 0x103039 [ 379.762326] kvm [16472]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 379.771829] kvm [16472]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 379.781073] kvm [16472]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 379.790468] kvm [16472]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 379.800415] kvm [16472]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 379.810157] kvm [16472]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 379.819802] kvm [16472]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 [ 379.829931] kvm [16472]: vcpu0, guest rIP: 0xcc Hyper-V uhandled wrmsr: 0x40000022 data 0x89173701 13:56:47 executing program 5: r0 = getpid() r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$getown(r1, 0x9) syz_open_procfs(r0, 0x0) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x3789, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000080)="b4a769ba245ac4c6d484f7339bd27eb134a84fe7730a70d76d31c7257b5e8ed4a0711145a70ad7a1f3a1849c64c7f0e945cd868b9da29599dd02643d24d1a642545f9cd2028e7d1617a1c010deef0833b95a62833c1fc7065bdc3139cce8a393d9ef72fb63fb6c72ed5e28fe56321fad574fcfdfcccb2c1432c2707ca04087bf9a8f5572d435c9464dab9f16c40724ef9c2d7e8d17f4246775e30b41ee015a", 0x9f, 0x100000000}, {&(0x7f0000000140)="e6990515dfce4169581e668de000e76bf4fc24b26b8c9bb5078c8795dd68bae9d9a6fd6a168d5758c937cca00005067721256433b795f577524d0ae69b7332093a47e1c0a352b2ef0bff9a16298b1832edc2c5cdabab09f81f4050682e6580f57707b4f6c97739a1ebcbf9899d4f34fbd17db612d595a7e049198f162f7a4033f11186b7836448ce6328a85a12f43f42e1d84d000e33a0bc1783344ad59e15ec", 0xa0, 0xffffffff}, {&(0x7f0000000200)="4361d9d7132592c7af7da5885895eb8d2024b8cbb4f965eb6ece00a2cef862877ed6edb7cce74b6d8d61d0c75f521058976aaf02a2dc08e4832f04242efb3dddec634ca8039ce904e2ac1a9b52daca06e00548f9cf7b2fd005bd0d9acbc3ad16bfa755e18a7a00c0c9fb48482d025d3d7a10cd2951f8fffb718ce2de6de51d3150abccb6d3891c7efd8b1ec2be034662571e95f841373a68e69e9d116a6ce2318b6c0f60c3fa67025a60a4543bc48b2e5e3de674e6c8", 0xb6, 0x9}], 0x8008, &(0x7f0000000340)='\x00') [ 380.037406] ceph: device name is missing path (no : separator in /dev/loop5) 13:56:47 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000300)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) dup(r5) r6 = dup3(r5, r0, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xe8) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x82080, 0x0) sendmsg$nl_route(r6, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80014200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@getlink={0x34, 0x12, 0x300, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, 0x14, 0x30}, [@IFLA_XDP={0xc, 0x2b, [@IFLA_XDP_FLAGS={0x8, 0x3, 0xa}]}, @IFLA_NET_NS_FD={0x8, 0x1c, r8}]}, 0x34}, 0x1, 0x0, 0x0, 0x8010}, 0x0) write(r4, &(0x7f0000000340), 0x41395527) dup(r4) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000200)=ANY=[@ANYBLOB="0200d60069791ccb8826f26417f7875e6f43d34a5f16ffb6e8fb1c1c787b38c463026c3d9f6c095f95b87167c671ddc1caab305bbcf877528a18d3864f75f6293c6090d3dcf60e6634d92eb2015bb34a16d21a7aaf891ff946f9517cdef01f0b8c6acdb85a1205617b0cec0084d8eb6bebe143c9791ad0ab3beac03f006134a332494c20ab4897cc14312ca9ad9290103ee83a8a89b21270b560eecf8cbc4d13390b7fd6aacf4c47d6e5375b04b708e7ad8cb4181d2d46e36863bf44744f0c2af0581d8537c062eb733b1679670ad1ee04a8c33b1e96a7058dd7"]) sendfile(r2, r1, &(0x7f00000001c0)=0x1d, 0x10a000d02) 13:56:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0x200) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r4, 0x8, 0x4f21311c0a79f3a2, 0x693, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}, 0x20) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) dup(r5) ioctl$TIOCLINUX6(r5, 0x541c, &(0x7f0000000080)={0x6, 0x81}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r6 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r6, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) dup(r4) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000080)={0x1, 0xf4, &(0x7f0000000380)="a559e104c97e94fc7d8b230d08ec7d60e59b66703f287c1a760bc1c9511d02519f20b025b360010b02a88e0f05d5debaefedaa30481f3fd049a87e8d942b6c67b9a8a5f77444e99fe793f290ba31d13ec0d74662f97976ed3d1222621f5819023c7f51bb862115afb7d3243f69fdb2275c72a840863af4a8d6d6a9ee04985620bef59c3242824724fb174687ae9f4a639b3825d582e210f03f980dc7dab0ea26d1a2682cb1d147599c09208f04120e5730788de15280ad045e44846591cbe7388b21737a1b3ee168e2b5c414e99512d95bc9abb44c07c185524d1b899261a21841dbf70451320f1523beb0a819f52f4871015f91"}) bind$netrom(r3, &(0x7f0000000140)={{0x3, @null, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @bcast]}, 0x48) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 13:56:48 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:48 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000000)) 13:56:48 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:48 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) dup(r0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgs\x00'/13, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x8100, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000280), 0x0) dup(r3) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f0000000140)=0x7fffffff) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:48 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:48 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) unlink(&(0x7f0000000080)='./file0\x00') r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:49 executing program 1: 13:56:49 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000080)={'veth0_to_bridge\x00', {0x2, 0x4e23, @rand_addr=0x10000}}) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) 13:56:49 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) close(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00), 0x4) 13:56:49 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:49 executing program 1: socket$kcm(0x10, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0xa, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000001c00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x4, &(0x7f0000000040), 0x10000013c) close(0xffffffffffffffff) close(0xffffffffffffffff) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 13:56:49 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:49 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000006000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe68}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 13:56:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) utimensat(r3, &(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000100), 0x100) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:49 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:49 executing program 5: r0 = getpid() pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000002480)='/dev/dsp\x00', 0x6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000040)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r6) setsockopt$inet_tcp_int(r6, 0x6, 0x0, &(0x7f0000000240), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0x52) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000200)='./file1\x00', 0xffffffffffffff08, 0x5, &(0x7f0000000740)=[{&(0x7f0000000800)="7f9dd09318bb27dc3b624fe8b8c10cdfc3bf6c69a28bcde9f16a26d6258ac8caa0bbc17d216d29f96cfdb599aa3b32dff7ce96f08f2e6edddf38a3903c0e3d32ba171fa8bdc59ec909194a4ac5b9f8b78ae99b4fea5c0dde9799f8515d9294bfb420f556e863147732b390ed89dbda94d30e08a72bac51d165fe116e11897f65dfe7547e23102d67145e79f893e1c7196f899a06e6703203e696443bdc6a69bd18", 0xa1, 0x6}, {&(0x7f00000008c0)="49c307edf94cded61e37c66fa6b57a7afeec8e5cf96e1a2b9d0d5eec8e9b0b1865b3e37bb4971218d0fd3cbcba8e86b6f216af6d38b98eb34a1e94d99641ee78973f7a0f983f771d66906a95633f1517fe9864bfcfe2a2b4f352625f07137f64f0f45ce467c15644d564e0e64a0ab67545ef4a0327f0c5bd30bd92cae3896ebc02838c31ac842e61ac4e34f301952ebdf3bd0ee4ed4f09f73c8e2667050f148539", 0xa1, 0x5}, {&(0x7f0000001340)="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", 0x1000, 0x81}, {&(0x7f0000000980)="b79fb9e9ab4feba22ffb95e39a9060853a62b915f0eaedc37775ddf61fd6675768a619b30e2176b77e8bd8bbc022779a59f7d5babc2fc0f39f0109936c4eca0a445eae8e5246eff2c48d9f929e91903886f9a80d3b1159c0f05001cea72625e5459cfe6bc743788ddd09fc840b7ba65021fa18cea3580fa47ca203c17f3a752fa96354c9c46635e12adccc73f71bcaad70391900e11a7e33452ba5c7b8dec059176166e2f4f3604f", 0xa8, 0x100000000}, {&(0x7f0000000240)="d87255883e3bbad7f5ffa5087cdbc112a8e4e2a026824686e9e5821dd4a27c401f3c5cc87173bd64", 0x28, 0x4}], 0x34048, &(0x7f0000000b40)={[{@init_itable='init_itable'}], [{@subj_role={'subj_role', 0x3d, 'net/snmp\x00'}}, {@uid_eq={'uid', 0x3d, r5}}, {@obj_role={'obj_role', 0x3d, '/dev/rfkill\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, ']posix_acl_access{vmnet0:'}}, {@obj_user={'obj_user', 0x3d, '/dev/rfkill\x00'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r7}}, {@fsname={'fsname', 0x3d, '/dev/swradio#\x00'}}]}) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r10) setsockopt$inet_tcp_int(r10, 0x6, 0x0, &(0x7f0000000240), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000200)='./file1\x00', 0xffffffffffffff08, 0x5, &(0x7f0000000740)=[{&(0x7f0000000800)="7f9dd09318bb27dc3b624fe8b8c10cdfc3bf6c69a28bcde9f16a26d6258ac8caa0bbc17d216d29f96cfdb599aa3b32dff7ce96f08f2e6edddf38a3903c0e3d32ba171fa8bdc59ec909194a4ac5b9f8b78ae99b4fea5c0dde9799f8515d9294bfb420f556e863147732b390ed89dbda94d30e08a72bac51d165fe116e11897f65dfe7547e23102d67145e79f893e1c7196f899a06e6703203e696443bdc6a69bd18", 0xa1, 0x6}, {&(0x7f00000008c0)="49c307edf94cded61e37c66fa6b57a7afeec8e5cf96e1a2b9d0d5eec8e9b0b1865b3e37bb4971218d0fd3cbcba8e86b6f216af6d38b98eb34a1e94d99641ee78973f7a0f983f771d66906a95633f1517fe9864bfcfe2a2b4f352625f07137f64f0f45ce467c15644d564e0e64a0ab67545ef4a0327f0c5bd30bd92cae3896ebc02838c31ac842e61ac4e34f301952ebdf3bd0ee4ed4f09f73c8e2667050f148539", 0xa1, 0x5}, {&(0x7f0000001340)="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", 0x1000, 0x81}, {&(0x7f0000000980)="b79fb9e9ab4feba22ffb95e39a9060853a62b915f0eaedc37775ddf61fd6675768a619b30e2176b77e8bd8bbc022779a59f7d5babc2fc0f39f0109936c4eca0a445eae8e5246eff2c48d9f929e91903886f9a80d3b1159c0f05001cea72625e5459cfe6bc743788ddd09fc840b7ba65021fa18cea3580fa47ca203c17f3a752fa96354c9c46635e12adccc73f71bcaad70391900e11a7e33452ba5c7b8dec059176166e2f4f3604f", 0xa8, 0x100000000}, {&(0x7f0000000240)="d87255883e3bbad7f5ffa5087cdbc112a8e4e2a026824686e9e5821dd4a27c401f3c5cc87173bd64", 0x28, 0x4}], 0x34048, &(0x7f0000000b40)={[{@init_itable='init_itable'}], [{@subj_role={'subj_role', 0x3d, 'net/snmp\x00'}}, {@uid_eq={'uid', 0x3d, r9}}, {@obj_role={'obj_role', 0x3d, '/dev/rfkill\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, ']posix_acl_access{vmnet0:'}}, {@obj_user={'obj_user', 0x3d, '/dev/rfkill\x00'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r11}}, {@fsname={'fsname', 0x3d, '/dev/swradio#\x00'}}]}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r12, 0x407, 0x0) write(r12, &(0x7f0000000340), 0x41395527) dup(r12) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f00000017c0)=0x0) r14 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r14, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r15, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r17, 0x0) r18 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r18, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r18) setsockopt$inet_tcp_int(r18, 0x6, 0x0, &(0x7f0000000240), 0x4) getsockopt$inet_IP_IPSEC_POLICY(r18, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f0000000200)='./file1\x00', 0xffffffffffffff08, 0x5, &(0x7f0000000740)=[{&(0x7f0000000800)="7f9dd09318bb27dc3b624fe8b8c10cdfc3bf6c69a28bcde9f16a26d6258ac8caa0bbc17d216d29f96cfdb599aa3b32dff7ce96f08f2e6edddf38a3903c0e3d32ba171fa8bdc59ec909194a4ac5b9f8b78ae99b4fea5c0dde9799f8515d9294bfb420f556e863147732b390ed89dbda94d30e08a72bac51d165fe116e11897f65dfe7547e23102d67145e79f893e1c7196f899a06e6703203e696443bdc6a69bd18", 0xa1, 0x6}, {&(0x7f00000008c0)="49c307edf94cded61e37c66fa6b57a7afeec8e5cf96e1a2b9d0d5eec8e9b0b1865b3e37bb4971218d0fd3cbcba8e86b6f216af6d38b98eb34a1e94d99641ee78973f7a0f983f771d66906a95633f1517fe9864bfcfe2a2b4f352625f07137f64f0f45ce467c15644d564e0e64a0ab67545ef4a0327f0c5bd30bd92cae3896ebc02838c31ac842e61ac4e34f301952ebdf3bd0ee4ed4f09f73c8e2667050f148539", 0xa1, 0x5}, {&(0x7f0000001340)="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", 0x1000, 0x81}, {&(0x7f0000000980)="b79fb9e9ab4feba22ffb95e39a9060853a62b915f0eaedc37775ddf61fd6675768a619b30e2176b77e8bd8bbc022779a59f7d5babc2fc0f39f0109936c4eca0a445eae8e5246eff2c48d9f929e91903886f9a80d3b1159c0f05001cea72625e5459cfe6bc743788ddd09fc840b7ba65021fa18cea3580fa47ca203c17f3a752fa96354c9c46635e12adccc73f71bcaad70391900e11a7e33452ba5c7b8dec059176166e2f4f3604f", 0xa8, 0x100000000}, {&(0x7f0000000240)="d87255883e3bbad7f5ffa5087cdbc112a8e4e2a026824686e9e5821dd4a27c401f3c5cc87173bd64", 0x28, 0x4}], 0x34048, &(0x7f0000002340)=ANY=[@ANYBLOB='init_itable,subj_role=net/snmp\x00,uid=', @ANYRESDEC=r17, @ANYBLOB="2c6f626a5f726f6c653d2f6465762f72666b696c6c002c646566636f6e746578743d757365725f752c66736e616d653d5d706f7369785f61636c5f6163636573737b766d6e6574303a2c6f626a5f757365723d2f6465762f72666b696c87002c61756469742c726f6f74636f6e746578743d73797361646d5f752c7569643e64abad397563869436f1934773aae2ad11c195641d1ac9c42d8dd5cea987829b", @ANYRESDEC=r19, @ANYBLOB=',fsname=/dev/swradio#\x00,\x00']) lstat(&(0x7f0000000080)='./control\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000280)='./control\x00', 0x0, r20) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001780)=[{&(0x7f0000000180)={0x15f8, 0x35, 0x8, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x10, 0x46, [@generic, @typed={0xc, 0x2d, @u64=0x5}]}, @nested={0x214, 0x55, [@generic="0a0b0633", @typed={0x8, 0x7a, @u32=0x9}, @typed={0xc, 0x29, @u64=0x80000000}, @generic="ee3545ce216d05bf5cd55072be5008a8b4f7a7c5160f6cd37d607bd21bf6dcf7b32e18b91622fdd6a8e8a15eb1e3358947221aed9509b165103e0605c981b0b58319e8cde3099d88fcbc5e8f8835252b4f51bcfa0338236b560166ed13a57b548775424ca9", @generic="e918edf9190061cd92afa01dcb663bbfda46075d41d0613a08102193a75ac4344d5e1be2b2ecf9bc74bcb1946b49c638263f1ee25f9cb2b8cb3ac7505c190485f5e5bd83242d97a2a94cdee5f30b41c3517bd75c97d7df17568469b2e09164", @typed={0x8, 0x91, @uid=r3}, @typed={0x8, 0x25, @ipv4=@broadcast}, @typed={0x8, 0x3c, @ipv4=@multicast2}, @generic="fe119ced448c7ddf320a98a85e3bf3290cdf25df0fb7cd4971eb2c165e00f6200a457982b783d6215476c72794e67b5a1e2c0dd1c2e6bc33b2e2bd5b827e307df704828e051294341419ec075298", @generic="e0b4352274146cecfc710f7053a59d4ed7a63c9c6fd16cc83e78ecc151d088849e211ca820be908c72bf58e07e228e497409b3dca7e6906fcc70af2d00e901df15b268bc8ea4bfeb291c8619858f13b09e48f666dcc12a2198a104439b271c4771063f3d00bb09bc204513cad53addbc9a5b6266d650d20808de3d121bd09aea63eccd69c98d77aefa20d492a00943a598ab0aa0e31ee4a9afca1eae4a505d0e6f6b39bf6e869878c1d3261bc3f812f1acc507dee561990ce720ee345db44aec075d56efebd8f4b0936269"]}, @generic="652be5d96b3333b64e040cfe341a64c8b621f1e4deb6f45d947714febfacb23467560802be2dc8d8197d1c3c22017967d915f0b75fb9f153d91d286129ce8d172804dfaf8a3a8a2137bb74a1742f990a92bad80005a781dc142222ef438f026b99435b8923004ea4167187ceaa332e78d276fffa201491959c471876dbb1814a72339071b0460748db596f311e3c577a644ba2324e9bfc436d59f428e805", @typed={0x4, 0x57}, @typed={0x8, 0x19, @uid=r5}, @nested={0x6c, 0x31, [@typed={0xc, 0x5c, @u64=0x7f}, @typed={0x4}, @generic="65b6fca9fb4af1bc93b58d1684874550cea48bd3cd2803f0b366e399319d6fe6d55444bd271dd0a0f511e84565bff8f0a9d5f8748087acac7a5a130da098fe7ab32a2cdfb6cdf081b392307ed65d38958d23fcd47076d9f3"]}, @nested={0x1184, 0x68, [@generic="a36a5ab0e6457093e825716e1dd0e69cf3cb838359b5ed584c0eaafa24e72bfea75737f1a75c3d5f233bbf6ada1540f6d8ac64ac1f2e85f07edef79a771530197aff3ed5085599749e9bf8ee5067d731d9652df934ae688ea8fbe46b0dfc65694766c533d940fabba5fe9b66a88f5dd78df09a8b62126aac872508f162049a4e03c9b205975b6ad6ad710d844b714de176e294823fdf3e6024669afab80f5ac3b2", @generic="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", @generic="a8f5abda54ac", @typed={0x8, 0x75, @uid=r9}, @generic="1a87654e414800f0507060909c146071d5f9440b7d471bc3eabedc6f5ece6a88371036e58f42dbbd09ac95e9122a26601de0703503dea421e34aaa8b0496f04608ddc0d52b005a299bc210bcbceee01937277280e751fe6976d68465bbf813c48a0f8a05053d6a9312edac858233e9f36b328e3858826fbbb87274a8023208798a72e3dfb18083297c7299bf0969ab16c6516328b68d372889a0c8780a978adb5ebde844be1abb7740fc2fde7c6a492231f2b679e318e74c38d951aa4b", @typed={0x14, 0x7e, @ipv6=@rand_addr="a32e8f1b49b3107ef63226eb3f5b6244"}]}, @generic="712a23eb1f68dfe57a5a1133fdaffe4cacd3f26b74cca18f63fad364ee9428ee759ab3228e32a952b53b11", @nested={0xfc, 0x7c, [@generic="0200d640ed6b2f6dca8ea233b901df299e856ce93190b565bc3eb53d9365c4bf89f04510bcf75bb88b686a563517c7e0", @generic="1c026563a0a9364fc1a647022cf4e58e9fb6964c3315015375af11607a49ade21cf4ba1c238990decd78dc3366f34737115b3a73e676cccf8c6de52ae5cda81f0c8b0f22ac26fc46e525a3e9712feed23b69df66e1f2045488d81d06e12022c8b70e106c0f406fa51ab491bb347666771035ca627754e8dbbf40f1d9b54c9bf92556975e4bc5a070e3c7aefdc88d130a8fe392fd8a6e923c50cc7ea38cc51e45bc5ed9fdc896f66da861833659d58791f2c6a2fe1dfbb98d1488102207c2ac8c5f811e4248"]}]}, 0x15f8}], 0x1, &(0x7f0000001800)=[@cred={{0x1c, 0x1, 0x2, {r13, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r14]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [r15]}}, @cred={{0x1c, 0x1, 0x2, {r0, r17, r20}}}], 0x88, 0x20000000}, 0x8000) syz_open_procfs(r0, 0x0) 13:56:49 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000006000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe68}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) 13:56:49 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)='\x00', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000480)="ff852d02", 0x4) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f00000000c0)=""/83, 0xa2bd1d5677b481f6, 0x0) keyctl$read(0xb, r3, &(0x7f00000003c0)=""/119, 0x77) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000300)={0x53, 0xffffffffffffffff, 0x7b, 0x5e, @buffer={0x0, 0x41, &(0x7f0000000200)=""/65}, &(0x7f0000000280)="37223b31a09a3b4bc4a23e635d20d4f572a7d0fb2437c75bbcf17955e2b0ad56a20aa382c97501820df03cd37c7ba12056c1afbd202234653a6bc456e394e95ea3ff7d5d7f03c1c9748f429ddfaa0c174138ebb37a2b1f26a62a9e290ad420a953bba66452ad6f9c11b95613aed29e53b55552bc17d78228d7bced", &(0x7f0000000080)=""/42, 0x5, 0x10, 0x3, &(0x7f0000000100)}) r5 = openat$cgroup_int(r0, &(0x7f0000000380)='memory.low\x00', 0x2, 0x0) sendfile(r5, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 382.310828] net_ratelimit: 14 callbacks suppressed [ 382.310884] protocol 88fb is buggy, dev hsr_slave_0 [ 382.321758] protocol 88fb is buggy, dev hsr_slave_1 13:56:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000006000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe68}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000001000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77fbac141414e9", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 382.470797] protocol 88fb is buggy, dev hsr_slave_0 [ 382.475970] protocol 88fb is buggy, dev hsr_slave_1 13:56:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 13:56:50 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:50 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) 13:56:50 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000000)={0x10000, 0x5, 0x3, 0x1}) 13:56:50 executing program 4: write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 382.870169] protocol 88fb is buggy, dev hsr_slave_0 [ 382.875456] protocol 88fb is buggy, dev hsr_slave_1 13:56:50 executing program 0: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) memfd_create(&(0x7f0000000000)='/cpuset\x00', 0x7) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000200)="dae75059d95da8fb79ff7fcaadd97c1b3d26a96ed0ea250c1b13f00f01eb2584654749272b6099b23c558701164bc2402bb4c161ba051339c320ac79cc8c787d8265660fd4d2dd57cc24e941f850fb0b47333469b6491a8e92bcdc4c52434d8b6ec507b66b199317c491918fe672026fd47a777052fdeabf6cb64cd86cf9a07dbd47b391e383439d95d728c778c6b861a590a190710c368fd7b526e4bf2252581d5643dae6244821376fdd2d7fcfc8f9ef68745517babda5473949ba8effc97705ca6ec45d430355c1a8fce22edeb08337ca5ab03c4cf08151e1a31c45367fd61bdaf44311123a853a1dce69e941a7892a6e64914fe2798d9e361912f1b8f796c8861ba82c0814bd5b21fe8ae43aabbeb96651331db8ba7b317ad90812628e263771f899216fb4b34f8b25830bf124360e4b813165f74625b2e796792f164ad49db914a2f5d269dbff9aba7672a1273f700970be3282aa608c6c8a6630171dfe6f4d12cceeea3024327bef677b5bc0d1f6393d68b951ca57e75d08900511946c5dc8a7898818a8eb0005f6c82a3a27d1282820236b057f3a308109eaea8caa66ed83fb4b4458bbfc54f0aa0417d86759d150bfc07712598d8e37fdbaa2e5f03c356bca3798c358fdb0f3ec2b257822d9c1eb49a8ef25d45f74874cafaa8645511510bc98ed083f921a280663a9dbc60b3854d0d0983df6c320967a21c184601e7f939741650411bc8612ef691f9083076ee82ce7e44e4791c21d26fd4a44563a4007bdf2649268f64bf11ff2ba1916123a51e0cbe546ba9dde3778b0237b2ec8254a0967965496475481429283d60c4b34dbd10eb284e367e38acc67ecf11b0127c1634a1cda7d235f0c37373fac325a2418bbe2b614f74b37238bf152a0df2618406068c8530306ad6e5f1edbc852bf211f2a618e9b526c0cac7ec355a2b7a9368f38f4f6485c4b5f19c2013be597f19921edb2945fe64db8313cfc476564d61ed8062ada0b2a1d1e20c7e42ca455c5b6addc1d348282c4b4fccc5925c5f6e021757d2d2c33c369379d4fc47562e8eae2b7a12da424971747410cc685fb33e4627b2fb6f5e05e2d32fec4f9f08a7d5087f3e9affc23a959f5cfcd7e69e80789d1ddad892be8a3083abeff55dbfbc88e049ab8fa3f5414bad8ee0e652939f032ec2f94f2de20ccf4bbada162f1ca04583789dc584a0fe2357e6e94344a7a6dd5d15083fd16c6423f89e114b1a298afd46878f48103d656af9d3814499aced36acc1db2dd516bc746d75ca696e377d7ee719a71c5600f78b5ee43e88e34269cf07936c11f33f7775107c622f1647ce228b3a74e6b77a0a8e9b8e980f21958e4073fabeedb9dc58318c9a898b85807365a0f5c40c07ba463117a26b0cdf6c011b38d5d366436dd6e82caabc5f7934c971f094199e832ab6df3ea418739501fc8d56ede02e5856020ec07f245249fed550434213ba7c94e6eed6530b866dfe1c6b2bb512a81735421594de2fbf2f68bc2c9741a859cafff481890866daadc204dde9ec032a5027fe62fe2df52b740ef452886bc002d2fd4e3ec8a35ce62e651e883eccecb425d5ccb68486dd7b3c4ce82dbbefe38674c5e58045cb0de5ff6f8d2f0dc266b58146ccda1a1bd2bcf63b1e10ebbace997240b09a67e500dc9111140fc397b01081af757cd3731d56b644172d1cb4a4473a4175f5adcd42e0fe2807e09e916f16a46f4c308f6ef21bf9f4cb20920fb8da5f09410ba3c5499eb59382e4f9a70c509147eab1080d9458c96487f32d2b7bec400884a7a2f486e1a994bf5cdae41368f308ff6cd0cad42c31fe81161f75b9096456baed81d44ee8d8903c474dd3b4c16b2f36c8c0d2d15e50a34a67c60976f5f03f519d556193b20b8ed6ce33ff147b1d072687fb6df4ae20dc40b2f953fedd7ca9a962e70efa5d8b374d3a8a3b573f60e8e0216ea4e2fbfec63a17076d57ec76506b6c13715eb409ccc5753b86b886350ef6692c25c06ba5abe86d68a9420aaad2826a68faf22550954e3ce3d509ec7b7f0ffc4531fb3fe94166a778515d44c18fc2cd53bcc6520e6d11743224f475b3ae656e93bf185d0a79255e782de98f5419ca461410b39bb8e72b67f26d2d9df10b8dbe817e2eb7d6230269fe90c3625198c34995468687ab23238f86893d7f2bb78da5140523ad3977c73a874fdacad30d979afb68da05c1b03f0500de5372e5bc8847781b6fc4795c05ed4d01efbc7ba1605e7b3befa0ba51be734da96fca53d7178e3811c10cf6d4f0c7524d8d97a5d3e6553c03e189b01d59a790e98257338ea869d20b61344c5087808cadf5d3c447c7c6746a3b50ea0b3165cc1a156f11c876003a33208e2cc5e95cc6e3e0837639808f7182f06e2dba79c2597bd3a232a94580985e16763454f7d6a8b3e7dce9c9bdc8afa2181994f7d995646505731a8e3647542127f2aee68add5425ab693b992ebb3991a507bc87982310ded37ac610f3d451e6dda9d6d7080722b0f6afdeb195e593924acfc8ea32c601aeb15501c70596ccb29d4cdbc24040443ad077b091bd2b6256e611d5416855dbf6667f2a2f4e1709ed74c3fa8ce0c104c9a8b27c26c83c0cc1ba2557fc30ff94595270f46662685c1f84a9054254ebaeb985afd2e87eca72cef37aa1a631dbbb75a680a0a540b720003013784123792d49e2f6adee6c3a4e10f449d488a7c564316f50f30b00889945c88bf43472f76f431015ae7365cb71ddf53c1cf3941d5beb6f0d8a9cb17bed6631213a7e7d73264859504bdc0c3c8f92ab91bd718f72020fe348b5d9eb1c7d929e06efdf0ed102cc418bd385ea49c8a2e531bf646bb6541cabe07832025ad0fa0d5aa3a4f500dc62e98e5d588b5ccf541c2e4f1503ebec2c9d722edebdeb178ec234013f81ab275ee372d4d494594383049ba9fd36826538a0841625f040ea7ab3e09afa9fd073c575ca98f4656227bd893dbb25e4d32e2257a9bdf9d559aa3b7980486a563f9067bba419c7b007bee2972fcc38d1eb64ec38a167509d92cfa67c3cf278e0b92b8630899e38403c1ffa05f1c3b746345780ccc8a32635e445bde56d95da65e4d743fdeb0253597bc478f672ddb2b7c0a0df0d73fcc601aded42eaec011dbae66ad98304d160f1ed8fdefff13e94160e5ca8af8cdef445ee47f0d6e7f235021c1007d3b7807d905f86a8e388121144dafb283b63445986248cf9310207a8c1229a44901219f8c173edd1682b152d774e8ca0151c3792d923aae5ca407336ebac9fc3f9873bdc975d9d3fa8672bdac4f6002cd20e010b1be87a7b75a38234ca8aa800a1ec2d44d139e29f826078332db0bf57304beb8cc8c74905575004b32d178424c2265b53df78fbf4fb426a8b2057de51bccd7b1f5e7cba4c3f62f21c8916164553e943247c0ff9b5c8417e5aceccbf91f56aa8dc5f4a2994ce007ea4784afe003338ff7b6242a5ffd34d69c6da0a3e29c4e24164cbb58b59120bb5329e567a267ee05c7b80846ce0bd8c9232e9665c116a23ba121811fdbfe27832621d43584f9f4d7b4b2e940f4c3aab609a0a664d8f68c6c2910639a54f24e7bc9518b41e0b3dd9e6aa1507f272254df59bc61d0e09421abecb74beea2ef2a2a982909d96e60060e833df68b6468777c202a8fdac830caf5116e904f03b4688363aabd7b251b8b583fb54d49b6fbd3517edeb2e9753f11a1e2f9fb223efea26057d43fa1398e58d9466d9881b65339665089f09342196e0f5094ef6f7be28fc71fc2657b6c1c481920f68a1ffbee7e95028aeee4ec6c97a0f4365668aada6534c1e3b4292255c9e5f0e3e86f7a2c289266377a67d45a9f132d4d51c7e1f802ba7b0066a61f9dddeaa017c7aa82288ee34871e0332b2d7e630fa0e502ad91db00582fc14fc9c9af86bfa5e381bf3b1a62f889674c415184273a12f6441e4b9d075d67ed1ba3b7a6b2a1c1ccaa2abb2029a6455b9832b7f2aafe848024add5e365bb08220f6810e138ba0b8f48dda103146cf80ed463672df553e1217698d3e79bcc41ec8f5704a9d2ce1766fbde3b358a98b1596ffedc4fd0f0a1fd1cdcc61c4edd910856337660b02efa37d839c1aff437cbbc0aa38b51d207d9a747de5a5a6dd40b53edd3da8d2cd9c66dc36a01554c746e2368498dfd59cbdf7e31d75627a1e1ab356fee0a2e6bed07d57f60d1e1e9669ceeaa9c271381b17d5878c4ef2d73c438b0bcb4f7c0545124dc1016961eaa6d817d4bc1eb748fe087e26c6e7857b0abdad3448969c1b0abcfa0815e32a9c0ac45fbba6f20733d4bb3477ccea04305aa7d39474f75e07cdd5f3c564253213a74fd0bcfb8f2dbbdff5d1a813c4a7773538cadfe0020bdb96306cb4e30869f0794516de4260b4b83593c2a6b4605252936402e92cd583ee1a73c21153a438af13c73a6c585e470d3e231b2baed2cb7fedb23f33a22dc7bba724121253f30a5760a3e61e8ea55224d6879e8d9c863eb481e41a52b6aa99ad50ffd640caf56d67b9764e61c1d9ed09e9a69167177d385b9f731e94983d4e53d0e1928342daba7a5809395aaaeffac1165e92a137d033238bda63e2839f5005aee4afe0ecbfe557efdb5ccf2d6230610e9409458f3a65d3e6dd2fdea680a0595856ba7de5bec0e593b9abebfb1210ab6e701374a5bc4666ba4616e1e10380664203322c1a9f632aa3c24e40da2ef880eca2f261e4e440d9d3adba42a6d95dd7cd4c6089caacb2ec0e534c0d82c7f84cc5a490879df0b86f73755a037add5910b283dbdeaa661671eb29d8c6fe3528079f49e814060d74be858298e497c2c971194afdcdc760d565e4436bc26f11587793ef265cefb2396607e2d4ecaf9cc8ddc59f7c1c67bcc7757402c150992989eedb63073fde097f2a3bc84f33d20c7709eb60165f4adad5d1d6a51a0e825d2a4d6df0c3504fb49f9853689eac8210fb0da0b9dc263d52df86a047ab1e1b48bc807339692dd69266b2a8951a29fcd644fdfd75704fe5a49f2d2ac903b46776663d075049d7f35828def047009adc9df8df8bdbd80971c3cadcc07920c0b4523b9b8e179ace7b0d66af7e2ede198056244d932a63f3db46def7b1eb8276616e224bd03b7337615017cd99ab8784a41ed302f9bfbca67ab89cb333c320f0f572113ddbe70b98b8ae966119bebe4dce5c3cf5ed830f4c3938111c0e564f9463b58ea966faf311926ee81a9eaf135bc46afcfea800a4095559a2a2ab2ec1174d6454fe718836207cba1f5ae976fbee361d17a4629d846ad416b882e16634a7922909a53d069bc522164ac38415e8bc3c4a18d171700327535a0bf04c39871d41d435c1853f4778ac6c07516aba9a51b8a4e60d80598a3413340a1038e706dc03d9d03e949edc87cd1df03ea0395dabe1b5da372e99d39ca2add270e839a1bb8ac76f1f2e1e7d1fe9b4e756a7346bb4501467ea802e08877e5055467acaee0b8bb0b732d1ac7ff33e312ab5d4e1ca390701b77aa29ab958e62235ab7745978296b4ca41731d345252b11f46f94ab5020475d863410e0316281bc93a3367ff987cb6dd1998dff4f4308a01e4c9b8a8e66dc18d4bf5c784bdbe454ae66ddabc9613ccb7b2a34898320a0db92627f5323bf4a68507824d66e096833bfa84b24dea236e24b6ee4aa18a6858c53e057a5acc6a6b9a22e03ac45326077c2f06ffd847dd94c1acc097dce2d98cb013e3112636ba0ab1fb51014bbf2573e18b642c1b338b4293b1709799584d826e45e8881ad8d88ae3cb9ebaee275292ffd6d3ba47e00", 0x1000}, {&(0x7f0000000040)="827f1fa2341424625e976d633cc75d50fc90a34aa62c93b879e424276fd0c94eb13e95bdf29e512fdeb94f4dad1c0aeb4a851e", 0x33}, {&(0x7f0000001200)="d6e458ed89621bf6d4ecedaec62acb10f0135f287d064209f84461d5b16b6262d8ddfc02a1b69643011567adbdc8e139ebb476901818fee90f460440cd3c03b1f81b3d04c3f0a44801d6d87690ee61dc612e491f56f50b4f6cfa1725fef02eaa6c0ecf948f637be05d450fe8dd61f8f2ce455a933001c4650540249fd9", 0x7d}, {&(0x7f0000000080)="964c394551ece81f904f11de34c66c20e121ade1a5b9ca2ca8379bd6491324c7c3f5b42a43863ab1", 0x28}], 0x4, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 382.995104] [ 382.996791] ====================================================== [ 383.003180] WARNING: possible circular locking dependency detected [ 383.009493] 4.14.146 #0 Not tainted [ 383.013114] ------------------------------------------------------ [ 383.016600] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 383.019426] syz-executor.1/16638 is trying to acquire lock: [ 383.031535] ((&strp->work)){+.+.}, at: [] flush_work+0x84/0x730 13:56:50 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) 13:56:50 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000080)={0x7, 0x5}) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000000)='\x00', 0x1) [ 383.032493] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 383.039246] [ 383.039246] but task is already holding lock: [ 383.039248] (sk_lock-AF_INET){+.+.}, at: [] kcm_ioctl+0x35d/0x1120 [ 383.039268] [ 383.039268] which lock already depends on the new lock. [ 383.039268] [ 383.039271] [ 383.039271] the existing dependency chain (in reverse order) is: [ 383.039273] [ 383.039273] -> #1 (sk_lock-AF_INET){+.+.}: [ 383.084369] lock_acquire+0x16f/0x430 [ 383.088694] lock_sock_nested+0xbd/0x110 13:56:50 executing program 4: write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 383.093288] strp_sock_lock+0x2e/0x40 [ 383.097622] strp_work+0x43/0x100 [ 383.100911] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 383.101594] process_one_work+0x863/0x1600 [ 383.101601] worker_thread+0x5d9/0x1050 [ 383.101610] kthread+0x319/0x430 [ 383.108018] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 383.112738] ret_from_fork+0x24/0x30 [ 383.112741] [ 383.112741] -> #0 ((&strp->work)){+.+.}: [ 383.112756] __lock_acquire+0x2cb3/0x4620 13:56:50 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x210000) sysfs$1(0x1, &(0x7f0000000080)='bdev\xc8-wlan0\x00') r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write$cgroup_pid(r4, &(0x7f0000000240)=r5, 0x12) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f0000000280)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0xfff, 0x4, 0x2, 0xc7c, 0x2, 0x4, 0x1f, 0x20, 0x0, 0xfffffffa, 0x1, 0x9}) sendfile(r3, r2, &(0x7f00000001c0)=0x10000000000, 0x10a000d02) 13:56:50 executing program 4: write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 383.112763] lock_acquire+0x16f/0x430 [ 383.112771] flush_work+0xae/0x730 [ 383.142582] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 383.144945] __cancel_work_timer+0x2f0/0x480 [ 383.144952] cancel_work_sync+0x18/0x20 [ 383.144965] strp_done+0x58/0xe0 [ 383.153698] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 383.159713] kcm_ioctl+0x8d9/0x1120 [ 383.159721] sock_do_ioctl+0x64/0xb0 [ 383.159729] sock_ioctl+0x2a6/0x470 13:56:50 executing program 4: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 383.192856] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 383.194922] do_vfs_ioctl+0x7ae/0x1060 [ 383.194930] SyS_ioctl+0x8f/0xc0 [ 383.194938] do_syscall_64+0x1e8/0x640 [ 383.194951] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 383.211746] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 383.214042] [ 383.214042] other info that might help us debug this: [ 383.214042] [ 383.214044] Possible unsafe locking scenario: [ 383.214044] 13:56:50 executing program 4: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 383.214046] CPU0 CPU1 [ 383.214048] ---- ---- [ 383.214050] lock(sk_lock-AF_INET); [ 383.214056] lock((&strp->work)); [ 383.214062] lock(sk_lock-AF_INET); [ 383.258234] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 383.262517] lock((&strp->work)); [ 383.262524] [ 383.262524] *** DEADLOCK *** [ 383.262524] [ 383.262529] 1 lock held by syz-executor.1/16638: [ 383.262530] #0: (sk_lock-AF_INET){+.+.}, at: [] kcm_ioctl+0x35d/0x1120 [ 383.262554] [ 383.262554] stack backtrace: [ 383.276952] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 383.278689] CPU: 0 PID: 16638 Comm: syz-executor.1 Not tainted 4.14.146 #0 [ 383.278694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.278702] Call Trace: [ 383.278721] dump_stack+0x138/0x197 [ 383.334433] ? vprintk_func+0x65/0x159 [ 383.338304] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 383.343677] __lock_acquire+0x2cb3/0x4620 [ 383.347831] ? trace_hardirqs_on+0x10/0x10 [ 383.352048] ? save_trace+0x290/0x290 [ 383.355837] ? debug_object_assert_init+0x163/0x300 [ 383.360837] ? save_trace+0x290/0x290 [ 383.364735] ? __lock_is_held+0xb6/0x140 [ 383.368819] lock_acquire+0x16f/0x430 [ 383.372599] ? flush_work+0x84/0x730 [ 383.376293] ? flush_work+0x5c6/0x730 [ 383.380074] flush_work+0xae/0x730 [ 383.383591] ? flush_work+0x84/0x730 [ 383.387281] ? insert_work+0x320/0x320 [ 383.391147] ? find_held_lock+0x35/0x130 [ 383.395187] ? del_timer+0xbd/0xf0 [ 383.398713] ? mark_held_locks+0xb1/0x100 [ 383.402859] ? __cancel_work_timer+0x166/0x480 [ 383.407423] __cancel_work_timer+0x2f0/0x480 [ 383.411812] ? cancel_delayed_work+0x20/0x20 [ 383.416205] ? mark_held_locks+0xb1/0x100 [ 383.420340] ? __local_bh_enable_ip+0x99/0x1a0 [ 383.424904] cancel_work_sync+0x18/0x20 [ 383.428858] strp_done+0x58/0xe0 [ 383.432203] kcm_ioctl+0x8d9/0x1120 [ 383.435824] ? kcm_done_work+0x20/0x20 [ 383.439698] ? __might_fault+0x110/0x1d0 [ 383.443741] sock_do_ioctl+0x64/0xb0 [ 383.447433] sock_ioctl+0x2a6/0x470 [ 383.451038] ? dlci_ioctl_set+0x40/0x40 [ 383.454993] do_vfs_ioctl+0x7ae/0x1060 [ 383.458864] ? selinux_file_mprotect+0x5d0/0x5d0 [ 383.463608] ? lock_downgrade+0x6e0/0x6e0 [ 383.467733] ? ioctl_preallocate+0x1c0/0x1c0 [ 383.472131] ? __fget+0x237/0x370 [ 383.475571] ? security_file_ioctl+0x89/0xb0 [ 383.479971] SyS_ioctl+0x8f/0xc0 [ 383.483320] ? do_vfs_ioctl+0x1060/0x1060 [ 383.487455] do_syscall_64+0x1e8/0x640 [ 383.491333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.496166] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 383.501354] RIP: 0033:0x459a29 [ 383.504530] RSP: 002b:00007fbff8943c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 383.512216] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a29 [ 383.519462] RDX: 00000000200000c0 RSI: 00000000000089e0 RDI: 0000000000000005 [ 383.526709] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 383.533962] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbff89446d4 [ 383.541212] R13: 00000000004c59b9 R14: 00000000004da290 R15: 00000000ffffffff [ 383.550152] protocol 88fb is buggy, dev hsr_slave_0 [ 383.555302] protocol 88fb is buggy, dev hsr_slave_1 [ 383.565030] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 383.573755] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:56:51 executing program 4: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:51 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:51 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) 13:56:51 executing program 4: pipe(&(0x7f0000000180)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 383.688609] kobject: 'loop1' (ffff8880a49625e0): kobject_uevent_env [ 383.704789] kobject: 'loop1' (ffff8880a49625e0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 383.722646] kobject: 'loop3' (ffff8880a49f46e0): kobject_uevent_env 13:56:51 executing program 4: pipe(&(0x7f0000000180)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 383.732527] kobject: 'loop3' (ffff8880a49f46e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 383.745215] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 383.751945] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 383.772116] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 383.779634] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:51 executing program 5: r0 = getpid() socket$inet6(0xa, 0x806, 0xb9) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000000)={0x3, 0xd5}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff8000/0x7000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000040)="84e270ba20c785ba1528a8295e05de1dcde65bda9f820752065123f30bc2f1cafc3ae2faac04bb2f09d4fe4065577793e3f3e625b9a70809e639fbcef3fa9190879540fd0caf62d4ba7f2ff4a249b30b76ea6aedfa417afac3e190bc14e027a6be669486d4fa0ec9f714e361cf21bb21556e81ba2820ab1535b67cc4d0a90a705adde2f3cd0b5baf4f877fbe0b36aa1e0d835a17550520aec38c9004626e0cab08404686918f0bcfde1441eb8eb0645ab052844d9093b1c20adecf6870e7718b23804fc984a9c1f43973e21f84454c6b18bfb4f723ebdd3c5e41f99fa0", 0xdd, r2}, 0x68) syz_open_procfs(r0, 0x0) 13:56:51 executing program 4: pipe(&(0x7f0000000180)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 383.886793] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 383.893476] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 383.917483] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 383.924095] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:51 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:51 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 384.070117] protocol 88fb is buggy, dev hsr_slave_0 [ 384.075245] protocol 88fb is buggy, dev hsr_slave_1 [ 384.090367] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 384.097322] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:56:51 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 384.126191] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 384.139484] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:51 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:51 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x8001}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000400)={r3, 0x3f, 0x1ff}, &(0x7f0000000440)=0x8) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000280)={0x101, 0x8, 0x0, 0x5}) r4 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r5, r4, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r6 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x200000001, 0x3, 0x2000000000000009, 0x2, 0x0, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r8, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r9}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={r9, 0x9, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000300)=0x2, 0x4) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$apparmor_exec(r10, &(0x7f00000002c0)=ANY=[@ANYBLOB='stac\a wlan1-posix_acl_accesskeyring-\x00'], 0x25) ioctl$UI_SET_RELBIT(r7, 0x40045566, 0x5) ioctl$VIDIOC_G_MODULATOR(r6, 0xc0445636, &(0x7f0000000200)={0x0, "7fbe00daf226a24e4be406b29bf3d7329c1133a9f9ce7df4d616f03b2a16e0b6", 0x212, 0x80, 0x144, 0xc93b78136f1ebe17, 0x557aa294d21400e6}) [ 384.187595] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 384.197954] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:52 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)=0x200) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_getaffinity(r4, 0x8, &(0x7f0000000100)) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:52 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) 13:56:52 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) [ 384.516933] kobject: 'loop1' (ffff8880a49625e0): kobject_uevent_env [ 384.523516] kobject: 'loop1' (ffff8880a49625e0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 384.539479] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 384.546494] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 384.572672] kobject: 'loop3' (ffff8880a49f46e0): kobject_uevent_env [ 384.581397] kobject: 'loop3' (ffff8880a49f46e0): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:56:52 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) connect$bt_rfcomm(r2, &(0x7f00000000c0)={0x1f, {0x20, 0x37, 0x0, 0x40, 0x2, 0x81}, 0x6}, 0xa) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r5}}, 0x10) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000600)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e23, 0xfffffffd, @ipv4={[], [], @broadcast}, 0x7fff}, r5}}, 0x38) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r5, 0x80000001}}, 0x10) [ 384.710401] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 384.716867] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:56:52 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 385.019083] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 385.025720] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:52 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000000000/0x3000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0x4000) shmctl$SHM_INFO(r1, 0xe, &(0x7f00000002c0)=""/218) r2 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1a, 0x1, "e1eb2e0589a5afd2a4a680dee064defbd077ca82d606a6591c1f261355f5df4e1632259be5f2afb08678b3cd2744e6be4d749fa590fe52c428e63caf1ac3ecfc", "2a84862adba520809f536cba5106984a8cad59e4917f88ae83fea76135b15934", [0x7, 0x80000001]}) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200200, 0x0) openat$cgroup_type(r5, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) sendfile(r4, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 385.069522] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 385.076196] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:56:53 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) 13:56:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000700)=[{&(0x7f0000000200)="42f60bcbeaa6b68fafdc4c6b46f2fb972e63d3c2d10ce6f9cf0e856b50b8fe283afffb76b75dc73a5b49f35e947fd82ac553ac8c398fadcd4e5fe3147582ee52c44cd82de1ec731ca02c69c92725682da0eec6bcbc0032f6f4c062e4eae860bc809d6363cd16b1c68d1a4a7cb863c25fc1ff5a07088acf0e216cefe3f7c03526ea55a4019c85948acceb12a5164634b5b73a67f4ac753ccf5a8e1f514f195b4f9ca7157482cf838fe24a2198f25234a9fce46391564db8332d6973da883fd3a32bfd670a36fa4681e62a1fdda5af0d403b600e4a77069729c1cd8240bef50dc265d84af1f2604bfd8d46521bac4d671499", 0xf1}, {&(0x7f0000000300)="a6da6810d458a9190dda9f766defa388af226af70c45b28c36223ce07f84806892e6b64009930ccbb7f1abefd69cd634b42c246bb690c69813a096c6f5d171f54a7c9770c34e74a832f7f587a20bd1bedb5d3ab60210c852599671bb826202c9d3d4f89d2d855a9487f5a1f33eaec89a3de7da6ce1c58601f4cf2ab1d69217535ab198835f211066f8c3bcdd4d625a6fcbe32faaaa604efc80175e6cfc041d6f2513bf25accbe2a9e40c31a2ec504eb6389d3a79894077585b682ac092f933a952d7f806a2581b54cf4476d866847789", 0xd0}, {&(0x7f0000000780)="9a58ae62e11240071c1835af2ae5ae127297254e2c70d8a43ef0b8ea5f93787c1077f438240fdc0341c78df1484028c3706a1805862fe6427a4972d5b0c613ba4e81172a905bccc6bd7cd8112d11817f6c24063bae8451c4186dfdb083f6dc7e701c405e8c8ea7a801d5549de832367fc57fa705983182d2153aee07fe8bc53395c952c775baa463bba4060417167c7a254738c49f9c0787b4b18d2ded6f8a64a8797af1a087828dd057117099a724e1aa7a6630d7baf2f864b1d108cfb021ebf4cd1f1803c8a1161797a9bc75a035b8ed988ca5a8484cc6a8e41e16870bb05197e7ae9913d44f39", 0xe8}, {&(0x7f0000000500)="e6d0ed8231f9ef94fe78b07e098e74c37f6e6923b8d531ff5c98305f5115950acf4d39d190b30c0bb66b932e39eb256241bc25ab5df55c00c0049e8521edd4d3b792a338d7c18c7f1331d5e30647915aa24866f171bd374bb07938df5ea9ca6473a58e5b7857ac96d4d048d79e9745873e6a2c9fe9dc017418c4b7a6bb8bb1f8d9648f3e5fad042cfd7f47e7b8f4f1b3d02e70f1bae4e248275703669644e4e05e91910078", 0xa5}, {&(0x7f0000000080)="898e053f3e9e811c829b690dd91f4590487e330d0bd2c2b1e598966b711dbfadd8f3d507ed736c", 0x27}, {&(0x7f00000005c0)="1ad1ab488fb3398073866afac4fac1d9e7073831f6c0d326cb6d3b8645a8913271636c2e4625c5cb8f973a41ff437851b9ee3623c7524c4891af4241fbb29cdb578f8e03b7caf2392eb38ed2e1ce59f12aeb85bb9e05d354355d", 0x5a}, {&(0x7f0000000640)="1c007041787f584d4af391d775f4c0ed19316b6dfb3d7548b7b25887fea73153cc96736ff09b3230576343dc80445544117100b462f68f2d5c5f6f9ee4aa4153af70a4477aacc70ee4340e49d11815efa1f0682abe981d86544c10cb5afed6e0813c503cf5c3d63666f3c0199f961ad604f3d74b88276a0fc7f63ac99a8be47154b802cf82b862dadba0059e7d3377c290f885dd309bcb6886b80bef9e261059f2972713e0de47cd86", 0xa9}], 0x7, 0x4) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') [ 385.383944] kobject: 'loop1' (ffff8880a49625e0): kobject_uevent_env [ 385.391938] kobject: 'loop1' (ffff8880a49625e0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 385.416755] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 385.423372] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:56:53 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 385.441733] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 385.456629] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 385.471969] kobject: 'loop3' (ffff8880a49f46e0): kobject_uevent_env [ 385.479127] kobject: 'loop3' (ffff8880a49f46e0): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:56:53 executing program 5: r0 = getpid() pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) dup(r4) ioctl$RTC_PIE_ON(r4, 0x7005) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)) syz_open_procfs(r0, 0x0) [ 385.578948] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 385.591390] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:56:53 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:53 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0x4000000, 0x10a000d02) [ 385.840006] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 385.846823] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:53 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) pipe(&(0x7f0000000180)={0xffffffffffffffff}) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) vmsplice(r3, &(0x7f0000000000), 0x0, 0x4) ioctl$KVM_SET_XCRS(r3, 0x4188aea7, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) 13:56:53 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 385.900304] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 385.906875] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 385.937634] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env 13:56:53 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x280000, 0x0) getpeername$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 13:56:53 executing program 2: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 385.944559] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:56:53 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cpusedwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 385.975097] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 385.981846] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:56:53 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) [ 386.199238] kobject: 'loop1' (ffff8880a49625e0): kobject_uevent_env [ 386.206291] kobject: 'loop1' (ffff8880a49625e0): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:56:53 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)) bind$alg(r5, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000006a40)=[{{0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000002340)=""/4096, 0x1000}], 0x1}}], 0x500, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r7 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r7, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:54 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 386.262459] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 386.269101] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 386.315611] kobject: 'loop3' (ffff8880a49f46e0): kobject_uevent_env [ 386.326693] kobject: 'loop3' (ffff8880a49f46e0): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:56:54 executing program 5: r0 = getpid() r1 = syz_open_procfs(r0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000000)={{0x5, 0x4cd, 0xb6e, 0x7}, 'syz1\x00', 0xe}) [ 386.426066] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 386.435972] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:56:54 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x2000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x195bec85c1dc178e, 'ip_vti0\x00', 0x4}, 0x18) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @broadcast}, 0x10) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000040)=0x8) r1 = getpid() syz_open_procfs(r1, 0x0) [ 386.557195] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 386.563798] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:56:54 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:54 executing program 5: getpid() pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) r1 = getpgid(0x0) syz_open_procfs(r1, 0x0) [ 386.652740] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 386.659358] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:54 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f0000000440)={0x4000, 0x9, 0x0, 0x5}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x4000, 0x0) r5 = dup(r4) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000400)=0x54) sched_yield() ioctl$CAPI_GET_MANUFACTURER(r5, 0xc0044306, &(0x7f0000000480)=0x2) getsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000200)=""/218, &(0x7f0000000080)=0xda) r6 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r6, r1, &(0x7f0000000100)=0xc000ffd, 0x8001) [ 386.820304] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 386.827074] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:56:54 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) [ 387.013209] kobject: 'loop1' (ffff8880a49625e0): kobject_uevent_env [ 387.019772] kobject: 'loop1' (ffff8880a49625e0): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:56:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000080)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='memory.max\x00', 0x2, 0x0) sendfile(r4, r2, &(0x7f00000001c0), 0x7) 13:56:54 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 387.128454] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 387.137134] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 387.156657] kobject: 'loop3' (ffff8880a49f46e0): kobject_uevent_env [ 387.164557] kobject: 'loop3' (ffff8880a49f46e0): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:56:55 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x8001, 0x404803) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000040)=""/202) 13:56:55 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:55 executing program 5: keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000000)=""/119, 0xfffffffffffffe5a) r0 = getpid() socket$nl_crypto(0x10, 0x3, 0x15) syz_open_procfs(r0, 0x0) [ 387.469328] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 387.476451] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 387.499006] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 387.507524] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:55 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3, 0x8000) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x80) r1 = getpid() syz_open_procfs(r1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x101280, 0x27) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000002c0)={0x24, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x4d, 0x0, &(0x7f0000000240)="92772f3a81a987210f3a9f3785a94440a664b430dcfd49d083eec784a2ec1d5374bd4feb02fb034e43004a604ec368cddd2a0dc6cca35bba1333c77cb8b4fc3abf8aae81ae1178659aea3bd4a8"}) fcntl$getownex(r3, 0x10, &(0x7f0000000140)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000380)={{0xa, 0x4e21, 0x3, @loopback, 0xfffffff8}, {0xa, 0x4e24, 0x1f, @remote, 0xf2d}, 0x8001, [0x4c30, 0x97, 0x0, 0x9, 0xff, 0x2, 0x9, 0x80]}, 0x5c) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RXATTRWALK(r5, &(0x7f0000000200)={0xf, 0x1f, 0x1, 0x4}, 0xf) socket$packet(0x11, 0x2, 0x300) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$getenv(0x4201, r6, 0x7, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={0x0, 0x6}, &(0x7f0000000340)=0x8) [ 387.523598] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 387.531304] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:56:55 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000100)={0x2, 'tunl0\x00', 0x2}, 0x18) r2 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:55 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@initdev, @dev, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'rose0\x00', r4}) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r8 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x1, 0x100) ioctl$sock_inet_udp_SIOCINQ(r8, 0x541b, &(0x7f0000000440)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000340)={r9, 0xffffffff}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000240)={r9, 0x800, 0x8, 0xfffff800}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000002c0)={r10, 0x5d}, &(0x7f0000000300)=0x8) sendfile(r1, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 387.649363] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 387.656008] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 387.667234] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 387.670086] net_ratelimit: 16 callbacks suppressed [ 387.670090] protocol 88fb is buggy, dev hsr_slave_0 [ 387.674986] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 387.678616] protocol 88fb is buggy, dev hsr_slave_1 13:56:55 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x2000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) [ 387.826714] kobject: 'loop1' (ffff8880a49625e0): kobject_uevent_env [ 387.834567] kobject: 'loop1' (ffff8880a49625e0): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:56:55 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) dup(r3) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='g\xe9\x82\xd6Eu\x0f\\\x8aemory.max\x00', 0x2, 0x0) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:55 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 387.949845] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 387.957759] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 388.009124] kobject: 'loop3' (ffff8880a49f46e0): kobject_uevent_env [ 388.015629] kobject: 'loop3' (ffff8880a49f46e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 388.230109] protocol 88fb is buggy, dev hsr_slave_0 [ 388.235232] protocol 88fb is buggy, dev hsr_slave_1 13:56:55 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 388.302036] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 388.308492] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:56 executing program 5: getpid() r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpgrp(r1) syz_open_procfs(r2, 0x0) [ 388.446617] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 388.457234] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:56:56 executing program 5: getpid() r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) dup(r2) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)=0x0) syz_open_procfs(r3, 0x0) [ 388.490351] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 388.496811] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:56:56 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:56 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$IMGETCOUNT(r3, 0x80044943, &(0x7f0000000100)) [ 388.550142] protocol 88fb is buggy, dev hsr_slave_0 [ 388.555296] protocol 88fb is buggy, dev hsr_slave_1 [ 388.571509] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 388.578154] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:56:56 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x48000, 0x100) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = fanotify_init(0x21, 0x1000) signalfd(r2, &(0x7f0000000100)={0x3d1}, 0x8) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x392) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_int(r3, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r5, r4, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0xab240, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000000000f166c7f162261635f5317c6ffb09d77d0000012aeaf61565e3ae1e193f4f29de8994689fe77ebe00"], 0x36) modify_ldt$read(0x0, &(0x7f0000000300)=""/6, 0x6) 13:56:56 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={r0, r1}) [ 388.602309] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 388.608877] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 388.640991] kobject: 'loop1' (ffff8880a49625e0): kobject_uevent_env [ 388.647706] kobject: 'loop1' (ffff8880a49625e0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 388.710095] protocol 88fb is buggy, dev hsr_slave_0 [ 388.715214] protocol 88fb is buggy, dev hsr_slave_1 13:56:56 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f00000001c0)=0xc000ffd, 0x410a000d02) [ 388.758546] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 388.766013] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:56:56 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 388.858178] kobject: 'loop3' (ffff8880a49f46e0): kobject_uevent_env [ 388.864699] kobject: 'loop3' (ffff8880a49f46e0): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:56:56 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 389.110121] protocol 88fb is buggy, dev hsr_slave_0 [ 389.115243] protocol 88fb is buggy, dev hsr_slave_1 [ 389.122809] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 389.129352] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:57 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa8, r2, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1a}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4c}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2a}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x8bff2d61d3a0c614}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4a}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 389.315821] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 389.322743] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:56:57 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}, {0x0, 0x7530}}) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:57 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={r0, r1}) 13:56:57 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0xc800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000100)={0x1f, 0x280}) [ 389.448841] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 389.461540] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 389.480400] kobject: 'loop1' (ffff8880a49625e0): kobject_uevent_env [ 389.488384] kobject: 'loop1' (ffff8880a49625e0): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:56:57 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000200)='cgroup.procs\x00\xde\x12\x11m\x8fm\x10\x04\xd4x\xb8\xffx\xfa\x05N\xcc`\x84\x82\xb3\xf3\x1b\x8b\xfeC\xac\xd6\xa4\xdb\x10\x06\xd8\xec\xd0\xbdG3i\x83\x85\xe2\xa6\x9f\x14L51\xbe7G\x84\xe5_\xec\xb5\xb1K\x03\x01\xb3\xdb=\x00|^\xa7\xe6\xe4\xea\x14D\xe9\xa3X1k\x88\xd8\xed\xfa\xc6\xc7d\x8aP\xb9\r\xddkk}\xe2\xb5', 0x2, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r2, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:57 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x249500, 0x0) epoll_wait(r4, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x3) [ 389.512227] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 389.518874] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:56:57 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x1040, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000100)={0x200, 0x8, 0x3, 0xc, 0x8001}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f0000000340), 0x41395527) dup(r9) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, r10, {0x0, 0x2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002f00)={&(0x7f0000002dc0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002e00)=@ipv6_newrule={0xa0, 0x20, 0x306, 0x70bd26, 0x25dfdbfd, {0xa, 0x14, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x10000}, [@FRA_SRC={0x14, 0x2, @mcast1}, @FRA_SRC={0x14, 0x2, @empty}, @FRA_SRC={0x14, 0x2, @empty}, @FIB_RULE_POLICY=@FRA_IP_PROTO={0x8}, @FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'ip6tnl0\x00'}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @FRA_SRC={0x14, 0x2, @local}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4001024}, 0x24000811) sendmmsg(r2, &(0x7f0000002d00)=[{{&(0x7f0000000280)=@ipx={0x4, 0xfffa, 0x6, "226d4fbb2026"}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000300)="9949f073bcabe40154b6a0f5704ccaa474615039bab5b5ea238bc190478bfd28e413ed9502345b7bf2e7e7d81d0f4c65c86864a2600107e197aaa9e41209925389f912df3b58010b1a46fd81b504e45288fe26be3648432a3a002e9322739e642a8bd4eef43673a3775758a6b10be9e194241839aef69f290387d516aa421f0b555602c05fa3", 0x86}, {&(0x7f00000003c0)="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", 0x1000}], 0x2, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x100}}, {{&(0x7f0000001500)=@ll={0x11, 0x2, r10, 0x1, 0x7f}, 0x80, &(0x7f0000002740)=[{&(0x7f0000001580)="ab5d80b4c248846df1c2e7f747711149ec349f711cc09d36a453e08316112a4240659419559e60e2c3aee0ebddb065c54335014c04944292fcb6", 0x3a}, {&(0x7f00000015c0)="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", 0x1000}, {&(0x7f00000025c0)="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", 0xff}, {&(0x7f00000026c0)="a96e71569e0f230cb1c98efa4f7046fd29d38aa07861699e3f1d65d98cd11533c7482b158ce26824a10505d18666dd890c9372ed54c4f74a54dbde86e45c5f2af9037a72cbcbe7d4a1bc2e14b6c0d8b2b9c4514a10ef4a1b030ac76e6a565e24b4", 0x61}], 0x4, &(0x7f0000002f40)=ANY=[@ANYBLOB="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"], 0x220}}, {{&(0x7f00000029c0)=@pppol2tp={0x18, 0x1, {0x0, r5, {0x2, 0x4e21, @rand_addr=0x7}, 0x3, 0x4, 0x3, 0x3}}, 0xffffffffffffff41, &(0x7f0000002cc0)=[{&(0x7f0000002a40)="afc8232d8d4e53b038bdcf0700f7176a40c4ba29dc850d6b90bb146fc473f53a7d26d6eecbbf269ac7a2c3400a4f74ea475430125a376f96f43a533d4e522f7b6c6b8723f5db194537e137e251c39823615e49ba37f506834c902ccc1eaac3cd6680fbae7838834da788c74e4c4cc0e5b43af30909fd980da09f15c8ebe9b0bf48", 0x81}, {&(0x7f0000002b00)="ec9e9d5e4b84969d2edab00f4b2401f6989fcd0defb39c032120b60cc610bc1a0433e97b9c9ad9173c8e8cb317e116bdbf59c6eeceff6b80f4c1811123f5cd3698008679f971c77f0d86c3f5973eea51e9761f5bd87a23ffbad7cb503b702df0d295b9676cd70ffe8b5d69c882bf22613eec7cea210f3efe03317866ff5fb05f84165eaf2fb80a5d2e70b0117af120919ead9e7bc46dff", 0x97}, {&(0x7f0000002bc0)="2dc9ec2e4723f1deaf57e92aef5666e4ba60ecb02c004c21b1b5ddbba3d9a491be4e76820928961a5b44191d96ed445e362db8c5571948915d153c8d296aa871f36d936f37c300341b6a38969f32c49253afcc98d0dda2b67dadcf8fe2d31fe824d82cc709df36de0a766da1c0cc3ac63158fd89ab473122e9b7814a997bec581d1c126daaa25d2d227b893b904a87ab1c803f063ee210178e21a6c7cb9d1d3265bb48636cf6a1fee91cd581f730d92ba524bcaab078f60d17a9de47bab39599fe37e9affca4", 0xc6}], 0x3}}], 0x3, 0x90) write(r5, &(0x7f0000000340), 0x41395527) dup(r5) ioctl$sock_rose_SIOCDELRT(r5, 0x890c, &(0x7f0000000200)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, @default, @rose={'rose', 0x0}, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}) [ 389.579865] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 389.587473] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 389.690656] kobject: 'veth4' (ffff888098e27070): kobject_add_internal: parent: 'net', set: 'devices' [ 389.701691] kobject: 'veth4' (ffff888098e27070): kobject_uevent_env [ 389.708228] kobject: 'veth4' (ffff888098e27070): fill_kobj_path: path = '/devices/virtual/net/veth4' [ 389.717878] kobject: 'queues' (ffff8880a056f648): kobject_add_internal: parent: 'veth4', set: '' [ 389.727443] kobject: 'queues' (ffff8880a056f648): kobject_uevent_env [ 389.734068] kobject: 'queues' (ffff8880a056f648): kobject_uevent_env: filter function caused the event to drop! [ 389.744390] kobject: 'rx-0' (ffff88808381fcd0): kobject_add_internal: parent: 'queues', set: 'queues' [ 389.754123] kobject: 'rx-0' (ffff88808381fcd0): kobject_uevent_env [ 389.760544] kobject: 'rx-0' (ffff88808381fcd0): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/rx-0' [ 389.771024] kobject: 'tx-0' (ffff888099f285d8): kobject_add_internal: parent: 'queues', set: 'queues' [ 389.780551] kobject: 'tx-0' (ffff888099f285d8): kobject_uevent_env [ 389.786896] kobject: 'tx-0' (ffff888099f285d8): fill_kobj_path: path = '/devices/virtual/net/veth4/queues/tx-0' [ 389.797832] kobject: 'batman_adv' (ffff88809fc54100): kobject_add_internal: parent: 'veth4', set: '' [ 389.808611] kobject: 'veth5' (ffff88805b1d6bf0): kobject_add_internal: parent: 'net', set: 'devices' [ 389.818546] kobject: 'veth5' (ffff88805b1d6bf0): kobject_uevent_env [ 389.825000] kobject: 'veth5' (ffff88805b1d6bf0): fill_kobj_path: path = '/devices/virtual/net/veth5' [ 389.834546] kobject: 'queues' (ffff88806070e548): kobject_add_internal: parent: 'veth5', set: '' [ 389.844057] kobject: 'queues' (ffff88806070e548): kobject_uevent_env [ 389.850564] kobject: 'queues' (ffff88806070e548): kobject_uevent_env: filter function caused the event to drop! [ 389.860827] kobject: 'rx-0' (ffff8880a97dba90): kobject_add_internal: parent: 'queues', set: 'queues' [ 389.870254] kobject: 'rx-0' (ffff8880a97dba90): kobject_uevent_env [ 389.876582] kobject: 'rx-0' (ffff8880a97dba90): fill_kobj_path: path = '/devices/virtual/net/veth5/queues/rx-0' 13:56:57 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$selinux_user(r0, &(0x7f0000000280)={'system_u:object_r:crond_exec_t:s0', 0x20, 'sysadm_u\x00'}, 0x2b) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="020700090200000000000000000000000021475a2adeaf3e4301889c91de072b67845e1a9daa204ac1c96c47fbea02d3869fceed860e6c97da3254b1cad7cb694664a56d53e150ce9f992673000000000000007e434dd334c740ed6ecaf67bf3626c2c892ad223dc94781e84c8fcae4547822f088407759a41d340000000000000000ac96fc9a04eccb11adc59ba6fafdeac32445119ada8afd12dbc2b805c5339be4c202b0ff1feb2ff5a1e89cdcebcf887eb6fb7c751de4eecbb6aaa3a4b1905e66f705b295da1e63bfe4f1b3574709269ef61022262e27df3fc687633d226c14c829140a53e5cc3dc31da8a0ed1dbd75d2973dc204acbb4a381ef7c9c30d285184299e4d73752e04fc336f23939842101638a704c4030d40c4cb7683f771fe3f11274f5d0ff9c9b5297de5a2ad9ff1668c62218381c8894803f7a651867"], 0x10}}, 0x0) r2 = creat(&(0x7f00000006c0)='./file1\x00', 0x21) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_SET(r3, 0x1, 0x0) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/11) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) connect$inet6(r4, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r4, &(0x7f0000007e00), 0x400000000000058, 0x0) write$P9_RATTACH(r2, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x84, 0x0, 0x8}}, 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r6, 0xc0045516, &(0x7f00000002c0)=0x7) pread64(r5, 0x0, 0x0, 0x0) ioctl$SG_SCSI_RESET(r5, 0x2284, 0x0) [ 389.887077] kobject: 'tx-0' (ffff888095057358): kobject_add_internal: parent: 'queues', set: 'queues' [ 389.896579] kobject: 'tx-0' (ffff888095057358): kobject_uevent_env [ 389.902985] kobject: 'tx-0' (ffff888095057358): fill_kobj_path: path = '/devices/virtual/net/veth5/queues/tx-0' [ 389.913931] kobject: 'batman_adv' (ffff8880948d9d80): kobject_add_internal: parent: 'veth5', set: '' [ 389.931477] kobject: 'loop3' (ffff8880a49f46e0): kobject_uevent_env 13:56:57 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r3, r2, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) [ 389.940471] kobject: 'loop3' (ffff8880a49f46e0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 389.958074] kobject: 'loop4' (ffff8880a4a26960): kobject_uevent_env [ 389.969393] kobject: 'loop4' (ffff8880a4a26960): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:56:57 executing program 5: r0 = getpid() syz_open_procfs(r0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffe) write(r1, &(0x7f0000000340), 0x41395527) dup(r1) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x21ac1, 0x80) read$FUSE(r2, &(0x7f0000000040), 0x1000) [ 390.130561] kobject: 'loop5' (ffff8880a4aa7260): kobject_uevent_env [ 390.137025] kobject: 'loop5' (ffff8880a4aa7260): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:56:57 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000000c0)={r0, r1}) [ 390.278862] kobject: 'loop1' (ffff8880a49625e0): kobject_uevent_env [ 390.285565] kobject: 'loop1' (ffff8880a49625e0): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:56:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000200)={0xb, 'syz0\x00', 'syz1\x00', 'syz1\x00', 0xd3, 0x5, 0xffffc9fb, 0x3ff, 0x4, 0x5, "761ca6569394326cb6eadfe67046af1a5667dc615a396c947706ae9f9687b9f1d2ca7af76d5140da4e195d3578a1a3cde2d6db7b0e193bb68b1cab7cf85c09f1612682193a618d1193336b451b6ba40b852f4c0f8a8eab808846ca44b2ba7f01886cb68a68b156f0b1c4d1fba3d9683fe1899af4c9bda9f461c947597ba4155b20cfe95a0d893614c5901249b1dce1e6c277b07f6095b0129e926ff0596bce3aa10cdc49888e0f5768cb5e6a3719a0ff93910b4e23a51f8f951d803e2457a7daec4f4958cd0e1dd2e1a6eb25a4474a693fe6e1"}, 0x1eb) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) sendfile(r4, r1, &(0x7f00000001c0)=0xc000ffd, 0x10a000d02) 13:56:58 executing program 2: ioctl$VIDIOC_G_PARM(0xffffffffffffffff, 0xc0cc5615, &(0x7f0000000200)={0x7, @raw_data="c39d1433c70aa9828811e629ab64325585b97dfb04583ecf0cb2a521e1618f8a2777d2814b95fe5b07ff675f74f4897f9dcf0ef4e658eba78dadc4f012048d48db1a266507c780e8af3764a1776229cd0df7d7b0e7b6446afd53f05c971f838b8ef5c4e5faee6ab9891e22bf4b4969cd99352d50c8cbac525fab097be97e0b72f8dec88bee2df119e9d50424317d9d37896d2bcb830c7fbcb3c114735e45ed41e4e660ba12d0f4cf43d613232d1d9e5226b82e9b3ce292b4e725958fc127e4c08fa6d7ce11e03d39"}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x14100, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000300)="41887712edf5b6a51262825eebfc85313df731c6b6da3df06a3b8148aaad0ecd440130237dcaa412c761a41c36399416696bd15528dfdc50af83d05f879731dd0c7e22f1154dc0769258553e0667bcc1f7bbb30ae315b6a9452446ab3743eb5733bbe9cc68d337b04edda5fe92216f8f0860049df4217893a994b41d2b9d245ee9b496834be18b6b0574bf358302bcdc921f00a921156c93e837cdb6048313460922f0c923e87ba8f6c3efd627508dcdd320345ac96191193b69ccb32070ccc1789c3e98f9b8ee49571cea878c1f77927e4f86291eec7e92621d78066ea57b200d6851c2372ab6fdc0e3c4e036ffc2d4502ee258de3a8b58") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setpipe(r4, 0x407, 0x2) sendfile(r3, r2, &(0x7f00000001c0), 0x10a000cff) [ 390.399630] kobject: 'loop0' (ffff8880a18f40e0): kobject_uevent_env [ 390.408568] kobject: 'loop0' (ffff8880a18f40e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 390.422051] kobject: 'loop2' (ffff8880a499e660): kobject_uevent_env [ 390.429049] kobject: 'loop2' (ffff8880a499e660): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:56:58 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\