[ 70.307727][ T26] audit: type=1800 audit(1565636975.217:27): pid=10053 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 70.357753][ T26] audit: type=1800 audit(1565636975.317:28): pid=10053 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 71.207926][ T26] audit: type=1800 audit(1565636976.167:29): pid=10053 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 71.228209][ T26] audit: type=1800 audit(1565636976.177:30): pid=10053 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.60' (ECDSA) to the list of known hosts. 2019/08/12 19:09:43 fuzzer started 2019/08/12 19:09:46 dialing manager at 10.128.0.26:33609 2019/08/12 19:09:47 syscalls: 2487 2019/08/12 19:09:47 code coverage: enabled 2019/08/12 19:09:47 comparison tracing: enabled 2019/08/12 19:09:47 extra coverage: extra coverage is not supported by the kernel 2019/08/12 19:09:47 setuid sandbox: enabled 2019/08/12 19:09:47 namespace sandbox: enabled 2019/08/12 19:09:47 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/12 19:09:47 fault injection: enabled 2019/08/12 19:09:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/12 19:09:47 net packet injection: enabled 2019/08/12 19:09:47 net device setup: enabled 19:11:32 executing program 0: modify_ldt$write(0x1, &(0x7f0000000000)={0x419}, 0x10) 19:11:32 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) unshare(0x20600) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) syzkaller login: [ 187.305072][T10224] IPVS: ftp: loaded support on port[0] = 21 19:11:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000100)=""/34, 0x10000017a}], 0x2, 0xa0008000) [ 187.464656][T10227] IPVS: ftp: loaded support on port[0] = 21 [ 187.476426][T10224] chnl_net:caif_netlink_parms(): no params data found [ 187.574646][T10224] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.589634][T10224] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.597525][T10224] device bridge_slave_0 entered promiscuous mode [ 187.618315][T10224] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.625499][T10224] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.633438][T10224] device bridge_slave_1 entered promiscuous mode [ 187.646856][T10230] IPVS: ftp: loaded support on port[0] = 21 19:11:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="7265737569643dca0fdeacd7d97065b7f452fb534fd022"]) [ 187.708606][T10224] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.746828][T10224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.766083][T10227] chnl_net:caif_netlink_parms(): no params data found [ 187.839804][T10224] team0: Port device team_slave_0 added [ 187.862567][T10227] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.871314][T10227] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.879258][T10227] device bridge_slave_0 entered promiscuous mode [ 187.887944][T10224] team0: Port device team_slave_1 added [ 187.906917][T10227] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.917063][T10227] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.925125][T10227] device bridge_slave_1 entered promiscuous mode 19:11:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) [ 187.945261][T10234] IPVS: ftp: loaded support on port[0] = 21 [ 187.975867][T10227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.053259][T10224] device hsr_slave_0 entered promiscuous mode 19:11:33 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 188.111896][T10224] device hsr_slave_1 entered promiscuous mode [ 188.170965][T10230] chnl_net:caif_netlink_parms(): no params data found [ 188.189953][T10227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.207193][T10236] IPVS: ftp: loaded support on port[0] = 21 [ 188.265703][T10227] team0: Port device team_slave_0 added [ 188.283972][T10224] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.284909][T10238] IPVS: ftp: loaded support on port[0] = 21 [ 188.291108][T10224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.291257][T10224] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.311689][T10224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.321872][T10227] team0: Port device team_slave_1 added [ 188.345133][T10230] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.352777][T10230] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.360511][T10230] device bridge_slave_0 entered promiscuous mode [ 188.385795][T10230] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.393311][T10230] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.401130][T10230] device bridge_slave_1 entered promiscuous mode [ 188.461411][T10227] device hsr_slave_0 entered promiscuous mode [ 188.499873][T10227] device hsr_slave_1 entered promiscuous mode [ 188.539980][T10227] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.564457][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.588427][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.622643][T10230] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.633316][T10230] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.665568][T10230] team0: Port device team_slave_0 added [ 188.673667][T10230] team0: Port device team_slave_1 added [ 188.770988][T10230] device hsr_slave_0 entered promiscuous mode [ 188.819886][T10230] device hsr_slave_1 entered promiscuous mode [ 188.879624][T10230] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.930528][T10234] chnl_net:caif_netlink_parms(): no params data found [ 188.947412][T10236] chnl_net:caif_netlink_parms(): no params data found [ 188.989163][T10234] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.996518][T10234] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.004480][T10234] device bridge_slave_0 entered promiscuous mode [ 189.011949][T10238] chnl_net:caif_netlink_parms(): no params data found [ 189.042270][T10234] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.049378][T10234] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.057127][T10234] device bridge_slave_1 entered promiscuous mode [ 189.076212][T10234] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.101128][T10236] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.108250][T10236] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.116162][T10236] device bridge_slave_0 entered promiscuous mode [ 189.124301][T10234] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.154090][T10236] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.161286][T10236] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.168932][T10236] device bridge_slave_1 entered promiscuous mode [ 189.186633][T10224] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.201738][T10238] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.208829][T10238] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.217206][T10238] device bridge_slave_0 entered promiscuous mode [ 189.236930][T10234] team0: Port device team_slave_0 added [ 189.244106][T10238] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.251485][T10238] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.259111][T10238] device bridge_slave_1 entered promiscuous mode [ 189.277322][T10234] team0: Port device team_slave_1 added [ 189.301078][T10236] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.313756][T10236] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.332325][T10238] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.343266][T10238] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.354901][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.362788][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.422893][T10234] device hsr_slave_0 entered promiscuous mode [ 189.469798][T10234] device hsr_slave_1 entered promiscuous mode [ 189.519653][T10234] debugfs: Directory 'hsr0' with parent '/' already present! [ 189.537812][T10224] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.547471][T10236] team0: Port device team_slave_0 added [ 189.554711][T10236] team0: Port device team_slave_1 added [ 189.573201][T10238] team0: Port device team_slave_0 added [ 189.580553][T10238] team0: Port device team_slave_1 added [ 189.652434][T10236] device hsr_slave_0 entered promiscuous mode [ 189.709967][T10236] device hsr_slave_1 entered promiscuous mode [ 189.749720][T10236] debugfs: Directory 'hsr0' with parent '/' already present! [ 189.764289][T10227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.771952][T10229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.780648][T10229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.788940][T10229] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.796049][T10229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.872427][T10238] device hsr_slave_0 entered promiscuous mode [ 189.909948][T10238] device hsr_slave_1 entered promiscuous mode [ 189.949748][T10238] debugfs: Directory 'hsr0' with parent '/' already present! [ 189.963118][T10230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.999205][T10227] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.007106][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.016624][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.025359][T10239] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.032443][T10239] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.040203][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.048612][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.057160][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.065824][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.074237][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.082634][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.091244][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.099461][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.107660][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.115358][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.122999][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.130803][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.138808][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.159409][T10230] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.177952][T10224] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.190079][T10224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.204934][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.213396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.221877][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.230635][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.239018][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.246111][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.254142][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.263185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.271564][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.278603][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.286235][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.294643][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.329399][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.338480][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.347014][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.354209][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.362255][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.370920][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.381274][T10224] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.401057][T10227] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 190.411729][T10227] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.439732][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.453396][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.463157][T10240] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.470244][T10240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.478582][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.487322][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.495982][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.505246][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.513739][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.522569][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.531257][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.539740][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.547929][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.556450][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.564830][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.573404][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.582588][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.590665][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.598334][T10240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.624476][T10227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.639027][T10234] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.649293][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.658359][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.670322][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.678620][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.687058][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.695442][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.711576][T10230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.732701][T10230] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.745010][T10236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.771556][T10238] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.790677][T10236] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.808079][T10234] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.815436][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.823430][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.832193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.839916][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.847482][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.856204][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.864836][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.871921][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.885473][T10238] 8021q: adding VLAN 0 to HW filter on device team0 19:11:35 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendto$inet6(r0, &(0x7f0000000040), 0xfffffffffffffeb2, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}, 0x8000}, 0x1c) [ 190.930282][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.938224][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.948701][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.968944][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.988454][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.997580][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.004789][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.014985][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.029427][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.058176][T10236] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 191.079231][T10236] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 19:11:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) [ 191.121121][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.132051][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.141871][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.168172][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.177560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.187185][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.196123][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.205764][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.215032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.226637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.234905][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.244163][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.252450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.261059][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.269318][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.276501][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.284824][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.293853][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.303005][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.310180][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.318070][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.326861][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.338906][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.347092][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.354716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.370123][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.378013][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.390692][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.398168][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.406498][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 19:11:36 executing program 1: r0 = memfd_create(&(0x7f0000000280)='system.posix_acl_ \x87cess\x00\xa1\'0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) [ 191.698800][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.720629][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.745546][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 19:11:36 executing program 1: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x2a) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 191.770798][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.784296][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.833797][T10234] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 191.861572][T10234] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.876138][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.885918][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.895233][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.907982][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.916667][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.925586][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.934130][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.942479][T10239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.952445][T10238] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 191.969414][T10234] 8021q: adding VLAN 0 to HW filter on device batadv0 19:11:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) [ 192.253572][T10330] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 192.312368][T10330] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 19:11:37 executing program 3: getresuid(0x0, 0x0, 0x0) 19:11:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:38 executing program 4: unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_group_source_req(r1, 0x29, 0x42, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @empty={[0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @rand_addr="e23f12285f3a0984856bea3933c98b29"}}}, 0x108) 19:11:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000280)='system.posix_acl_ \x87cess\x00\xa1\'0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000101e86860000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf000000000000000000000000176c002e0909df3dc99a671878cb1517a3865152cd89edc668a2eb018eae4350207541b1bc1756c2ffe7eededd562958b5f7a3737c1d8854e690623a61e384c2be822dffe84bfffb310e3629f2c928a1031ab5b2631f9fa05cd693ba42551d3e480e0a424190eb508c500f62fe3daff87123d75b635ab3b4bbca52df93b5b9b8593c5418f49d1fbe1c4eb710b064169890e6992c634cdd1d9ca50e6591263f76cdeb6c8049fadfeb13c59e14df1e590d6c0e3d53a3a62a921ac7eb77f3b98747a059b2"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:38 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000002c0)) 19:11:38 executing program 3: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet(0x2, 0xa, 0x0) mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) 19:11:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:11:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(0x0, 0xa9f5c5443712a514) 19:11:38 executing program 5: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 19:11:38 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mlockall(0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mlockall(0x0) [ 193.268038][T10380] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 19:11:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000cd8000)=""/1, 0x2e171c03}], 0x1) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x6) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f00000000c0)=[{r3}], 0x1, 0xffffffffffbffff8) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000100), 0x0, 0x0) dup2(r2, r3) fcntl$setown(r3, 0x8, r1) tkill(r1, 0x16) 19:11:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x1) [ 193.788092][ C1] hrtimer: interrupt took 55905 ns 19:11:39 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) mount$9p_virtio(&(0x7f0000000200)='\x00\xfbr\xb0\xef\xb7\x9f\xa27\xcd\xa6\xc2\xccNu\xf9\x1es\xa9)V\b\x00\x00\x00\x00ii\x90.\x97{\xc15k-\xbbMSzlE\xf3\x1f_\xb8\xef\x0f\x05SS\x93\x9a\xceb\x1c\x86\xca`\xa9\xc1D3\xc7\xcdL\xaa\xab\x90\xdcpB*\x87\x03\x00\x00\x00Z\x99\x93_o\xfb$\xb2j\x03\x03g\xa0#\xb9\xf3\xe9\xc4\x1a\xf5V\xd1JP\x8ahs~1\x1d{\f\xaa\x8f\xd6W\xfa\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbc', 0x0, &(0x7f00000000c0)='9p\x00', 0x40000, 0x0) 19:11:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:39 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 19:11:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:39 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000001940)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0x0, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) 19:11:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000280)='system.posix_acl_ \x87cess\x00\xa1\'0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:39 executing program 5: 19:11:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:39 executing program 3: 19:11:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) 19:11:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:39 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) 19:11:39 executing program 3: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x2a) r3 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) 19:11:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) 19:11:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000101e86860000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf000000000000000000000000176c002e0909df3dc99a671878cb1517a3865152cd89edc668a2eb018eae4350207541b1bc1756c2ffe7eededd562958b5f7a3737c1d8854e690623a61e384c2be822dffe84bfffb310e3629f2c928a1031ab5b2631f9fa05cd693ba42551d3e480e0a424190eb508c500f62fe3daff87123d75b635ab3b4bbca52df93b5b9b8593c5418f49d1fbe1c4eb710b064169890e6992c634cdd1d9ca50e6591263f76cdeb6c8049fadfeb13c59e14df1e590d6c0e3d53a3a62a921ac7eb77f3b98747a059b2"], 0x80}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:39 executing program 1: 19:11:39 executing program 1: 19:11:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) [ 194.730407][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 194.736549][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:11:39 executing program 1: 19:11:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000101e86860000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf000000000000000000000000176c002e0909df3dc99a671878cb1517a3865152cd89edc668a2eb018eae4350207541b1bc1756c2ffe7eededd562958b5f7a3737c1d8854e690623a61e384c2be822dffe84bfffb310e3629f2c928a1031ab5b2631f9fa05cd693ba42551d3e480e0a424190eb508c500f62fe3daff87123d75b635ab3b4bbca52df93b5b9b8593c5418f49d1fbe1c4eb710b064169890e6992c634cdd1d9ca50e6591263f76cdeb6c8049fadfeb13c59e14df1e590d6c0e3d53a3a62a921ac7eb77f3b98747a059b2"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) [ 195.129582][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 195.135428][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:11:40 executing program 5: [ 195.289596][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 195.295471][ C0] protocol 88fb is buggy, dev hsr_slave_1 19:11:40 executing program 3: 19:11:40 executing program 1: 19:11:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:40 executing program 4: 19:11:40 executing program 5: 19:11:40 executing program 1: 19:11:40 executing program 4: 19:11:40 executing program 5: 19:11:40 executing program 3: 19:11:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:40 executing program 5: 19:11:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:40 executing program 4: 19:11:40 executing program 1: 19:11:40 executing program 3: 19:11:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:40 executing program 5: 19:11:40 executing program 3: 19:11:40 executing program 1: 19:11:40 executing program 4: 19:11:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:41 executing program 5: 19:11:41 executing program 4: 19:11:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:41 executing program 3: 19:11:41 executing program 1: 19:11:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f0000000100)=0x68) 19:11:41 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:11:41 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_genetlink_get_family_id$tipc(0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x229}) 19:11:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0xfffffffffffffecf, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 19:11:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:41 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYPTR64], 0x8) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) 19:11:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="0200eeffffff01000000ff07000000000be5a941524453", 0x17, 0x1c0}]) 19:11:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:41 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:41 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000100)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/193, 0xc1}, {0x0}], 0x2) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 19:11:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setuid(0xee01) rmdir(&(0x7f0000000040)='./file0\x00') 19:11:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) [ 196.594720][T10598] Dev loop3: unable to read RDB block 1 [ 196.626804][T10598] loop3: unable to read partition table 19:11:41 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000000105000600200000000a00000000000000000500e50008070000001f00000000101e86860000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700a51409ac4cb3cbcf000000000000000000000000176c002e0909df3dc99a671878cb1517a3865152cd89edc668a2eb018eae4350207541b1bc1756c2ffe7eededd562958b5f7a3737c1d8854e690623a61e384c2be822dffe84bfffb310e3629f2c928a1031ab5b2631f9fa05cd693ba42551d3e480e0a424190eb508c500f62fe3daff87123d75b635ab3b4bbca52df93b5b9b8593c5418f49d1fbe1c4eb710b064169890e6992c634cdd1d9ca50e6591263f76cdeb6c8049fadfeb13c59e14df1e590d6c0e3d53a3a62a921ac7eb77f3b98747a059b2"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0x5, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:11:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x4) [ 196.670260][T10598] loop3: partition table beyond EOD, truncated [ 196.693746][T10598] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:11:41 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[]], 0x8) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:11:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:41 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) [ 196.820152][T10598] Dev loop3: unable to read RDB block 1 [ 196.837056][T10598] loop3: unable to read partition table [ 196.874080][T10598] loop3: partition table beyond EOD, truncated [ 196.906891][T10598] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 19:11:41 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = dup(r1) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000002004e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002000000e000000100"/272], 0x110) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2c) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 19:11:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @rand_addr="1d3bc6151f6b0621fddaf56735b5b1a6"}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={r1, 0x1000, 0x20}, &(0x7f0000000080)=0x18) 19:11:41 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:42 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = dup(r1) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000002004e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002000000e000000100"/272], 0x110) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2c) fcntl$setstatus(r1, 0x4, 0x80000000002c00) 19:11:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @rand_addr="1d3bc6151f6b0621fddaf56735b5b1a6"}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={r1, 0x1000, 0x20}, &(0x7f0000000080)=0x18) [ 198.969570][ T5] Bluetooth: hci0: command 0x1003 tx timeout [ 198.975852][T10629] Bluetooth: hci0: sending frame failed (-49) [ 201.049655][T10239] Bluetooth: hci0: command 0x1001 tx timeout [ 201.055765][T10629] Bluetooth: hci0: sending frame failed (-49) [ 203.130902][ T5] Bluetooth: hci0: command 0x1009 tx timeout 19:11:51 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) dup2(r0, r1) 19:11:51 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:51 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:51 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @rand_addr="1d3bc6151f6b0621fddaf56735b5b1a6"}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={r1, 0x1000, 0x20}, &(0x7f0000000080)=0x18) 19:11:51 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_genetlink_get_family_id$tipc(0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) 19:11:52 executing program 4: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mice(0x0, 0x0, 0x80000) socket$inet6(0xa, 0x6, 0x6061) 19:11:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:52 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @rand_addr="1d3bc6151f6b0621fddaf56735b5b1a6"}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={r1, 0x1000, 0x20}, &(0x7f0000000080)=0x18) 19:11:52 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={0x0, 0x1000, 0x20}, &(0x7f0000000080)=0x18) 19:11:52 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:11:52 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={0x0, 0x1000, 0x20}, &(0x7f0000000080)=0x18) [ 207.651531][ T26] audit: type=1804 audit(1565637112.607:31): pid=10688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir668188066/syzkaller.C8HT87/17/memory.events" dev="sda1" ino=16611 res=1 [ 207.721137][ T26] audit: type=1800 audit(1565637112.607:32): pid=10688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16611 res=0 19:11:52 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_genetlink_get_family_id$tipc(0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a0f, 0x1700) 19:11:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bridge_slave_0\x00', 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r0, 0x0, 0x0, 0x4018040, &(0x7f0000000040)={0x2, 0x4e22, @initdev}, 0x10) sendto$inet(r0, &(0x7f0000000100)="f0", 0xcd4, 0x4004000, 0x0, 0x0) 19:11:52 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={0x0, 0x1000, 0x20}, &(0x7f0000000080)=0x18) 19:11:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @rand_addr="1d3bc6151f6b0621fddaf56735b5b1a6"}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={r1, 0x1000, 0x20}, &(0x7f0000000080)=0x18) 19:11:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:52 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f00000003c0)='/dev/snd/controlC#\x00', 0x105, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0x40405515, &(0x7f0000000000)) 19:11:52 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:52 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:53 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x3}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d}) 19:11:53 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x7, 0x80}) 19:11:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) [ 208.378265][ T26] audit: type=1804 audit(1565637113.337:33): pid=10759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir668188066/syzkaller.C8HT87/18/memory.events" dev="sda1" ino=16597 res=1 [ 208.403795][ T26] audit: type=1800 audit(1565637113.337:34): pid=10759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=16597 res=0 19:11:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @rand_addr="1d3bc6151f6b0621fddaf56735b5b1a6"}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={r1, 0x1000, 0x20}, &(0x7f0000000080)=0x18) 19:11:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x1, 0x0, 0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) 19:11:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r3, &(0x7f0000001740)=[{&(0x7f0000000100)=""/57, 0x39}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x3) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0x10101, 0x0, 0x0, 0x800e009e0) ppoll(&(0x7f0000000080)=[{}, {}], 0x2, 0x0, 0x0, 0x0) shutdown(r5, 0x0) r7 = dup(r2) shutdown(r7, 0x0) 19:11:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00'}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:53 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @rand_addr="1d3bc6151f6b0621fddaf56735b5b1a6"}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)={r1, 0x1000, 0x20}, &(0x7f0000000080)=0x18) 19:11:54 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) 19:11:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x6}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x40000000000002b, 0x0) 19:11:54 executing program 4: ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=0x9, 0x4) bind$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) listen(r0, 0x9) listen(r0, 0x0) 19:11:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$pid(0x1, 0x0, 0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioprio_get$uid(0x2, 0x0) [ 209.725266][T10847] ================================================================== [ 209.733380][T10847] BUG: KASAN: null-ptr-deref in rxrpc_unuse_local+0x23/0x70 [ 209.741105][T10847] Write of size 4 at addr 0000000000000010 by task syz-executor.4/10847 [ 209.749440][T10847] [ 209.751787][T10847] CPU: 1 PID: 10847 Comm: syz-executor.4 Not tainted 5.3.0-rc4-next-20190812+ #64 [ 209.760979][T10847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.771032][T10847] Call Trace: [ 209.774329][T10847] dump_stack+0x172/0x1f0 [ 209.778675][T10847] ? rxrpc_unuse_local+0x23/0x70 [ 209.783650][T10847] ? rxrpc_unuse_local+0x23/0x70 [ 209.788607][T10847] __kasan_report.cold+0x5/0x36 [ 209.793559][T10847] ? _raw_spin_unlock_irqrestore+0x11/0xe0 [ 209.799374][T10847] ? rxrpc_unuse_local+0x23/0x70 [ 209.804423][T10847] kasan_report+0x12/0x17 [ 209.808776][T10847] check_memory_region+0x134/0x1a0 [ 209.813900][T10847] __kasan_check_write+0x14/0x20 [ 209.818837][T10847] rxrpc_unuse_local+0x23/0x70 19:11:54 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000740)=@ll={0x11, 0x0, r0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) 19:11:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x1) [ 209.823597][T10847] rxrpc_release+0x47d/0x840 [ 209.823610][T10847] __sock_release+0xce/0x280 [ 209.823622][T10847] sock_close+0x1e/0x30 [ 209.823634][T10847] __fput+0x2ff/0x890 [ 209.823653][T10847] ? __sock_release+0x280/0x280 [ 209.845794][T10847] ____fput+0x16/0x20 [ 209.849789][T10847] task_work_run+0x145/0x1c0 [ 209.856907][T10847] exit_to_usermode_loop+0x316/0x380 [ 209.862207][T10847] do_syscall_64+0x65f/0x760 [ 209.866802][T10847] entry_SYSCALL_64_after_hwframe+0x49/0xbe 19:11:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) [ 209.872699][T10847] RIP: 0033:0x413511 [ 209.876605][T10847] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 209.896481][T10847] RSP: 002b:00007fffca17b610 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 209.904894][T10847] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413511 [ 209.912867][T10847] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 0000000000000004 19:11:54 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000740)=@ll={0x11, 0x0, r0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) [ 209.912875][T10847] RBP: 0000000000000000 R08: 0000000000760d28 R09: ffffffffffffffff [ 209.912881][T10847] R10: 00007fffca17b6e0 R11: 0000000000000293 R12: 000000000075bfc8 [ 209.912897][T10847] R13: 0000000000000002 R14: 0000000000760d30 R15: ffffffffffffffff [ 209.929094][T10847] ================================================================== [ 209.945982][T10847] Kernel panic - not syncing: panic_on_warn set ... [ 209.960190][T10847] CPU: 1 PID: 10847 Comm: syz-executor.4 Tainted: G B 5.3.0-rc4-next-20190812+ #64 [ 209.971226][T10847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.981287][T10847] Call Trace: [ 209.984591][T10847] dump_stack+0x172/0x1f0 [ 209.988957][T10847] panic+0x2dc/0x755 [ 209.992869][T10847] ? add_taint.cold+0x16/0x16 [ 209.997554][T10847] ? rxrpc_unuse_local+0x23/0x70 [ 210.002498][T10847] ? preempt_schedule+0x4b/0x60 [ 210.007368][T10847] ? ___preempt_schedule+0x16/0x20 [ 210.010639][ T3879] kobject: 'loop3' (0000000082b46d39): kobject_uevent_env [ 210.012490][T10847] ? trace_hardirqs_on+0x5e/0x240 19:11:55 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(0xffffffffffffffff, &(0x7f0000000740)=@ll={0x11, 0x0, r0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) [ 210.012508][T10847] ? rxrpc_unuse_local+0x23/0x70 [ 210.012522][T10847] end_report+0x47/0x4f [ 210.012540][T10847] ? rxrpc_unuse_local+0x23/0x70 [ 210.027628][ T3879] kobject: 'loop3' (0000000082b46d39): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 210.029697][T10847] __kasan_report.cold+0xe/0x36 [ 210.029714][T10847] ? _raw_spin_unlock_irqrestore+0x11/0xe0 [ 210.029726][T10847] ? rxrpc_unuse_local+0x23/0x70 [ 210.029740][T10847] kasan_report+0x12/0x17 [ 210.029753][T10847] check_memory_region+0x134/0x1a0 19:11:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000fcff00000000000001000008", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000347589669ca5654fb9e05a942e451fe3fd54b673382a480538c0c94412e1540739a0278c4c2cda1ed97116ef40f98b847839e7684590c394cd8c84774b30c691"], 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000fdffffff0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000000000e1ffffffff8787ccb2644b44968e6dc1cdc911ad67e61588f48a6eaf8218b62cc06a2dd3fb4de0d96e7243f38a7d15d71ac895a26836ffce8853f5d1c3695450a1b615ddca"], 0x80}}, 0x0) [ 210.029771][T10847] __kasan_check_write+0x14/0x20 [ 210.078918][T10847] rxrpc_unuse_local+0x23/0x70 [ 210.083697][T10847] rxrpc_release+0x47d/0x840 [ 210.088294][T10847] __sock_release+0xce/0x280 [ 210.092890][T10847] sock_close+0x1e/0x30 [ 210.097059][T10847] __fput+0x2ff/0x890 [ 210.100882][ T3879] kobject: 'loop3' (0000000082b46d39): kobject_uevent_env [ 210.101055][T10847] ? __sock_release+0x280/0x280 [ 210.108185][ T3879] kobject: 'loop3' (0000000082b46d39): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 210.113020][T10847] ____fput+0x16/0x20 [ 210.113035][T10847] task_work_run+0x145/0x1c0 [ 210.113058][T10847] exit_to_usermode_loop+0x316/0x380 [ 210.113080][T10847] do_syscall_64+0x65f/0x760 [ 210.141772][T10847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.147681][T10847] RIP: 0033:0x413511 [ 210.151585][T10847] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 210.171398][T10847] RSP: 002b:00007fffca17b610 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 210.180255][T10847] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413511 [ 210.188239][T10847] RDX: 0000000000000000 RSI: 0000000000000081 RDI: 0000000000000004 [ 210.196323][T10847] RBP: 0000000000000000 R08: 0000000000760d28 R09: ffffffffffffffff [ 210.200614][ T3879] kobject: 'loop3' (0000000082b46d39): kobject_uevent_env [ 210.204306][T10847] R10: 00007fffca17b6e0 R11: 0000000000000293 R12: 000000000075bfc8 [ 210.219549][T10847] R13: 0000000000000002 R14: 0000000000760d30 R15: ffffffffffffffff [ 210.220528][ T3879] kobject: 'loop3' (0000000082b46d39): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 210.228916][T10847] Kernel Offset: disabled [ 210.243490][T10847] Rebooting in 86400 seconds..