[....] Starting periodic command scheduler: cron[ 45.852379] audit: type=1800 audit(1582774517.783:30): pid=7837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 50.160611] kauditd_printk_skb: 4 callbacks suppressed [ 50.160624] audit: type=1400 audit(1582774522.093:35): avc: denied { map } for pid=8010 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.35' (ECDSA) to the list of known hosts. 2020/02/27 03:35:28 fuzzer started [ 57.011755] audit: type=1400 audit(1582774528.943:36): avc: denied { map } for pid=8019 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/02/27 03:35:30 dialing manager at 10.128.0.105:42337 2020/02/27 03:35:30 syscalls: 2955 2020/02/27 03:35:30 code coverage: enabled 2020/02/27 03:35:30 comparison tracing: enabled 2020/02/27 03:35:30 extra coverage: extra coverage is not supported by the kernel 2020/02/27 03:35:30 setuid sandbox: enabled 2020/02/27 03:35:30 namespace sandbox: enabled 2020/02/27 03:35:30 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/27 03:35:30 fault injection: enabled 2020/02/27 03:35:30 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/27 03:35:30 net packet injection: enabled 2020/02/27 03:35:30 net device setup: enabled 2020/02/27 03:35:30 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/27 03:35:30 devlink PCI setup: PCI device 0000:00:10.0 is not available 03:38:56 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x2e}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1001}, 0x4000) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x60, r1, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_SEQ={0xc, 0xa, "e34c1db79287ba90"}, @NL80211_ATTR_KEY={0x1c, 0x50, 0x0, 0x1, [@NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "4a359b65cb"}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x60}, 0x1, 0x0, 0x0, 0x4004010}, 0x80) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300)='ethtool\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={0x0, @dev, @multicast2}, &(0x7f0000000380)=0xc) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000500)={0x0, @llc={0x1a, 0x305, 0x5, 0x1, 0xff}, @can={0x1d, 0x0}, @hci={0x1f, 0x4, 0x4}, 0x8, 0x0, 0x0, 0x0, 0x4cc8, &(0x7f00000004c0)='veth1_to_batadv\x00', 0x0, 0x4, 0xff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000000800)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000880)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c80)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000001d80)=0xe8) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000001f80)={&(0x7f00000002c0), 0xc, &(0x7f0000001f40)={&(0x7f0000001dc0)={0x14c, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_LINKINFO_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_LINKINFO_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x140000c0}, 0x20004804) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000001fc0), &(0x7f0000002000)=0x4) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000002040)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@multicast2}}, &(0x7f0000002140)=0xe8) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000002180)='/dev/zero\x00', 0x10000, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r10, 0x4010ae67, &(0x7f00000021c0)={0xd000, 0x102000}) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002200)='/selinux/checkreqprot\x00', 0x28000, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r11, 0xc0105303, &(0x7f0000002240)={0x2, 0x81, 0xff}) r12 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002280)='/dev/vcs\x00', 0x608001, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r12, 0x29, 0x41, &(0x7f00000022c0)={'filter\x00', 0x4d, "53b4a70dd79ab0d14ce13ea2fd61657e6a7bf683391c3cbc3f80e2fc8bc5d863bfc0ec2705f562331f22ff95926778fe8911f75da61a62743e162b1d107e2afe49a4d00569ad698a13cf750d30"}, &(0x7f0000002340)=0x71) fcntl$getflags(r0, 0x40a) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000002380)=0x60, 0x2) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r12, 0x800443d3, &(0x7f00000023c0)={@none, 0x40, 0x4, 0x5}) r13 = openat$full(0xffffffffffffff9c, &(0x7f0000002400)='/dev/full\x00', 0x40080, 0x0) ioctl$EVIOCRMFF(r13, 0x40044581, &(0x7f0000002440)=0x4837) r14 = syz_open_procfs(0x0, &(0x7f0000002480)='net/route\x00') setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r14, 0x84, 0x75, &(0x7f00000024c0)={0x0, 0x9}, 0x8) r15 = syz_open_dev$vcsa(&(0x7f0000002500)='/dev/vcsa#\x00', 0xbf1, 0x8000) bind$rds(r15, &(0x7f0000002540)={0x2, 0x4e23, @multicast2}, 0x10) [ 264.275360] audit: type=1400 audit(1582774736.213:37): avc: denied { map } for pid=8037 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16422 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 264.372019] IPVS: ftp: loaded support on port[0] = 21 03:38:56 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x80c, r1) ioctl(r0, 0xffff, &(0x7f0000000080)="0543037ebbe82fe9dbb1821f5c870ea11303c0b6b6b77f8cd6895460fae2e522b4723d5e75233cf9f7b96b0da2d923ee4461ec9f2d7ac072bfdd5f5e473e9a1a1ae17d9437f240204188e1c24f81bd37d390a9ebc3aeb4a186dfc5bb56dc9b291758d6f09ea2918e80ed23e9bf7f43bac0fd551bb6f34394e97cdcb74aebe870e5547f5ad08f82419ecd380ccb70e5165aaee9cf394c0e2eb69761e4f7cbe369e8f7ecb88d96d1475380447aebf94043cf23909f48c52b59b1b4c4b9e79b7f25e493bb07313de9464844fcc0956d944971c6339609035861296052d39cb0b7ddf51d3b5e517ce0aa856d73132cb6a7417d0d29584a9fc366cc49c621ef0e73cd21c134139715777ea1e32059078e322f985092c10150e68a6df763eea69f0a4ed4d41f603cf4eacc6caa5b12ae37565132148fae21202068dbb69c8200ac9c25ac40982fda24d2ead8104fa7e2dd8ad20e63c1908d459bb156644d18b6228f6fe1599edd90651f37e7b25a207cd5eb31d3e613e72e7d42eb8e635575ba2de0c33e627828641b9d65016fdd9e33f44d6030bfbfed365aa7fa12f5744e08e05b85cb9ac2da77064bab2c958b6a0e4d35a2fdeda9a9c635fd2d570595ced5536ebea5fa0a20d8fbe381e7c9afa9594851e1620e3a5712c1d722e279d8d53bb7528f4d5d83648a888683b9e787b433deda65b58e253cfa26aea2a2c36a970fde6dde3a1549a98bdc6f7bd87a34e335c9379b02b878e7b72ab6a3b5303830cefbb90c46f62be661b00346234322e454e9c86e8e33ec27202a096025a2aa81e6728de21ac8dabbd11b641af8610790beae6b7cc25b24e76307b675d8708666ec19568f1512e27c78bd2f7763d983aaa0c4c4a372a20f55950ff2f6c13c12540262f79fa41145880b6b7639a4f970f84fde1c25252b02a6a3248d5d4260ce25ddce0e6741ae54f6e0767ae983f3b8c4d0c5182e16748586892ca8d18af150e246aa774dfad4de484b57c47e1a7aef544e180d2fbcfa16c1131c8fcdfdc381f99542b93736e1690ae7950376ef1b86a44620cead3e362cbcb099b73c1a1acc7e7f1647c35ca246b2d2cb6d0122e73e55914f223d02cab5926fb63620309d341c7eb4ee1c2ebebfaa25a171fee7b1f0ce9d62442ad27a8c35eab9112da67617be940bc7be8bc9913da401d48ecd99b6d7388eb30af04320255a94823064bf83f69f327b8c3df76fbcfddb865758f8ca8ef41e49eedfa8d4e3cd5f479d6fc6c8294aaa13987891034b4980db5fa01c4ec18c58b429b433bf66a82bd352f0417c71a5ec04c865be5adccb750e656d9208b00267a01dca023fe23c7c28d14dd00c6ee66035f987b55215eca8649083e512cdb732dc4a340dbc0dc68e4352e270f0a9822fdb4b9135237adcb081913cdb62b5ede2a2e9f6f6cf9f648f8f156c64698f85a1a69a470111a4c3fb44e4d2a685dbcbb5b845b0064b0de8d0f9c407b8b513a8000ec7370dea8d8d53381deae0478e65d096512b6816d26bfdc35377c0862b86eff2928855de17bd703ccb152d2b4a9d6e707c4cb0058b6352a377523731c5b5a56ded1f3aedab01ca105aab99a2b8bfd6cd7e45b5de26e7b37f3b8791289889ae2b8fe40b8e3593d0a66be191aa1c131218a1cc64b9237553e000014b9d3533193bcef18fef90820d46ccb3f7d23b1f1068c6238aa5bee482ebe6d6f4f8f5c959f7b62fad7fb79f6cf38baad17bac33ab03a89c970ae824de9f25cc96391430aed1805b7a96c7783cc7e84c536940889e54007794dcc69e6a0dc3f20a003f84fc4ae4984aedaf16df78120924293a549dd0bd0fcc879ad06bcccfd52288cc854203b3198f4e9764ad4f143ff60d042cb62fcbc24dcefea91d2035e16cdaddd01e08cd339472fd676e73b36efd65cc4b549c31c9b4128eb074ad57e6e1acab61e431cd1f9363d857d153c65e918dc214d8e36fb7d5cc5d6237eb41f8e0b5216daef3fb3d045f04c758b166ec785fc6fbced9fd0a714078efa5fe4ce2f84f3f27dad0a46b5da15d244ae1ad99b722d5c4e6232c1212b44925043eaa8b37ed716d9b9da5bd9246a29a6ad944dfa082ec141248d75e03904c17e609635273fbc55746437b399fe25468003d3f411b57c56de4d886b41ae13ef34b8fb829c9c40e2c8c66babfd270a83caccf7b55fbbb03a7241a15e6d72d292b3eb1c6e31693109a8a97587262e2734335fb50b4e8f040fe618c38c1d59c1425a70031842fa090330802c100e5c7abaf2aaf5d104321c8c07308ffc30233d78df684df18d88cea6ef2efe432db59d58af4587ffd6bbd77601a2ae2d36aa04ca951955a7e14a435c2239f1a7da2635ab09a55d621406e1af204ff1e6353d7cb018bac292773a3e5b5ed606153e988fee82c70137a0d43edae98571d5471e905afc8c134e5ca7cd87b31d4436600beb613365fe9432defac483a1ae25b9cb92e5619a561d508390b9b3fa22ce3ec39241dbe52ebf4fd8f0ed870e710dff3c358a748013f8adf518bdfa9b3ca15a3ab634b391842affb04e41f94538a446490542a2793a66f4df0845c9fda49c2658fcc961fca5c975ec2c6bb9d3233ef7d4a0752e25ac8e7eefc21efcfe2e7b2579d1451ed904d84ee6f282e88097955ddab6616bceea1671183a5c40a57a04ab0b24ab706098e044112e1873faffeb1ba762a4157c42ea2863743ba64ce4472220205f9f865d4518c18d1ebf1ee61684ba10c77d0d03642fb1d3f39fad132b2d6513e39743f1a278c40ef3a521f291666783873968356f426b8a5d2e06676b1b84940d6038e20c5728d91b05ea18c18335d20eeff7858caf84f5c5a3b3557e7baa18086088092d935ce34d9743cad9e236528ca1b0a34e3443cb7e9a914526d8151e7a289f69bf6adb4157202d5c6dccaedd16889e4a3799c6c7180bd3a111c8b072abf046b7346f13a0597a477384d53b2a6b3a0821ccf92231a0dff196cd3d1d1b2088f229ce43fb46a05c856960293959160e0a5b91649fd9cb49542c84bc585e712e538449d22142bcadf203d7777dade8868cceca49852ac6c1e972260932eb95f3da7781693c736a5479c8f1a0f3727acfa29ea04f11c4cd9edb2ee4630f75037272de07a64c4ddb241f99435e6adde35be5457f3b476aee1293651056f3c022dcb1581c2b29e19bffcc33ae15104f2926c5e0d346aa84fb54f791e2e7b8d0dbb43d59998381341615a5999aabe86a20c3231a7057d1a842239d5909626224e543b2e85422631eb5040c669c4568700b064bddc667386304746453cc69a800007c87327d16949b5ac9a9f95add5b95d446465417b7ffdd5443ad15a258778d064058b76195fa1fc8af40ff95f962a79fa09cfac7b36ca9314b9926b3aaef7e1ca782354b51b2d1c30071f872cdc1aaf0fa68ca7928ea771cba529e2a3074370fe52c5644b675f0d4a9e52879faa9b809cba068f6613b4b706872e4ee6b72489153d47aed873194bd5e26707ccf2960d0c26c895f1fe0a89e80ae24445e83064e43f4c58990696feee9127e70b7b997d59f1fab707faf5587d8d40355ce356feebf741af994d3b9441a3b1e16acf8805de8c791795b5784c3b328d0b6ffcfdc0174b4d5934456d55d64163ebf60e5f95e4d89223acfbcb03cbb6b778210d975e043e84834ff305368fe8d25e6f24bb6f007f203e2020c6a4f0e1f187504f563f65c4f63f764ab3d64a81e76f7e8baf42ec6f3a6ebb56168aa59f477d7bb17ecc03f0a4c55a304c3c95ea806e36277f5f6baf1c9df1228cadd96b183c123307d9b37b19d299cd933f1642de763556aef711806f94f76f816c0d640b2559715ca310be57eace1b7eba7f5c1e31e17c488469baf75df7d510cee018aab2cd51daa9f3456b66b8062ad46808485abb20c6b9cdb12cf0f0ebb3021c86b3877a3a34f9bb016a114acf309a9f191d5a44940b03f815e145a0b69a1482f392f812621fbf2c0b6df47b5a932a8e35c7c2f21dda327e6ba2410dabf44e7e0c92695b32108d60f95954d64b148b008ef098c9250029cb624cb9edf743ba86080701d9fd3177b2d519b876346127ff497b9c45d6f16272976cfcbc91ced61020117e96a0d9047d1bf57d95ec4166cb6c080bd303b12e30c0cd0b39e0619383da264609b6288727dfd7ee063bd738487900c611cc914b3d19bc955296a3d779e79c04fdae2613fc9cf788f3986b0c611c5e6bbb83eb57acdf6bd32198ae927311c858dfd85d13fd8d0fac7825f240d6009fd68fe701e94f80ecfef45f77f57a91eaeb61ff91c40b921677574ff9fea06e0d533215bad1b3c190d125fe863622ce680312681d204140c3bab8ba016ff6e9fb5eeaa8702ce6f5a05ff285e37b3471790daa2281bf71cbc43c47a3a9e2e0a6f39ee4f4b06a7e5bb1614ecba3921940c44d7c2024eb210c11e606288c845d38ea71d161030f032cecaf6eee819d5a8c54ea99439608adbff0a04129e6a517740c078cf535bedc0f3ea27861f00d1d82e429196b61b66db5441cfe3e16f07c5638956ac4252807471df70ecde0c71a3a005015680bf610345933e0056ced5961571a8fadf01382370bb2df0a2310aba999d91c3950ee4851a5c5046dd5437cf380fe7f5f38c8c31a2a01cf05d3ccabef3cb20a96c0b564695286cb879f8d37580820420ff6a2457b260de7d9bc0663ab9467c58fb9cb900aac5eeca3b9059240004a7f5bed87da389ebb90c889e188a09cc9afc5516472515b59651c5a4b837ccb342d71db4f719dbbb428fba5c669942e6ed819ed6b6ce96cfc307e6643ac369b08e187241d000351b29ca13c0e77f030fcd3f1212f1b70206809011910d2214e4707737615735000fd4c357864b1aadd673a9d8296b8366415ed8decf09b0d1bad4f1a952d18b96e311441f89df9835712939c3bd8fd2100942c70f4df1095d6462707ca7e8d7c3016c4aedc7d0e6ae0eeba68b26e2e78b4a09f2170ee7cb3b56ddccd6781af155cdea66501581ea23a89b5a7e75fa89a08313ca63e1b45acb64e7e9be2fece21ffa41c6f5f1975d45c05ce6922f33e3d041aa652e51d23c1164feab0e665abfbddcdf79a362c175a99e023dd6eeb15e9e417e083095fe228772bb0b1aea0e45f4f4fb8dd12d4dc6e682d34be36e7e18715130422f9463576e8608493eaa12cfcbb91fbb7b58812153aad71ffa7655dc4be0a6d9d1133f7734e1ba4431e0825bccf13eeec7c4e814c2ef9698933e7e0378c48a0f618590ba549c15cea0801f16997b2e0911f06315f5b98ce7306b6392a9f755aa0c656d5e4f5297496ab3f05ead16e83ad0e4e6b65806f89be0f783d7e1d7240aa54f3f11a726ce4f0268e7d6d1a2d018f2e8e7160dcced93e83d536f3315b1cbd567dae5738a54edbd0eea7c59217fe1d6e595546fdcbb68a92f2332754dfaa895cb87acdefebb3bf7ca52a49f0e324c96390c6bd9a32893a9e2eb750c1e13accdeb2209759183f5ba632053feab31cb34fb54f1eda82c27166130a36e51bd7586a4a2ce58fab3c2a617c620894fcecc0295cf2c9ddadef3d5f7aabd95ba735b4bd47c9135fba085f87829efb7f4ed3f67f99d4943cfee0f6a7905981153530493800cb4c815c6b45d8a5859cecb54346bc81ee391422db495674eb5e66c83147d4cc3dcc683d1ff39007b98adc3c1697ae3d4606e1c81a96c6c6b02653da6f9cbee170baac88e300d383c83e7b69a8b90f059ecf81ad0a6786dec4e18207baee80ca9c8c0e2be96e6b9c8ea524459d155a4f010669cc") syz_open_dev$midi(&(0x7f0000001080)='/dev/midi#\x00', 0x48, 0x109000) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f00000010c0)=0x18b9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001240)=0xe8) r4 = geteuid() r5 = getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001280)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001380)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f00000014c0)=0xe8) stat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffffff, &(0x7f00000015c0)='./file0\x00', 0x2700, 0x2, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffff9c, &(0x7f0000001700)='./file0\x00', 0x2000, 0x800, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getgid() newfstatat(0xffffffffffffff9c, &(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900)={0x0, 0x0, 0x0}, &(0x7f0000001940)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000001100)='system.posix_acl_access\x00', &(0x7f0000001980)={{}, {0x1, 0x2}, [{0x2, 0x6, r3}, {0x2, 0x0, r4}, {0x2, 0x3, r5}, {0x2, 0x3, r6}, {0x2, 0x1, r7}, {0x2, 0x7, r8}], {0x4, 0x5}, [{0x8, 0x2, r9}, {0x8, 0x6, r10}, {0x8, 0x4, r11}, {0x8, 0x6, r12}, {0x8, 0x5, r13}], {0x10, 0x7}, {0x20, 0x1}}, 0x7c, 0x0) r14 = socket$nl_crypto(0x10, 0x3, 0x15) fcntl$setstatus(r14, 0x4, 0x2800) r15 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/bsg\x00', 0x242440, 0x0) ioctl$EXT4_IOC_MIGRATE(r15, 0x6609) r16 = socket$vsock_stream(0x28, 0x1, 0x0) fsetxattr(r16, &(0x7f0000001a40)=@known='com.apple.FinderInfo\x00', &(0x7f0000001a80)='*\x00', 0x2, 0x0) r17 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001ac0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r17, 0x40045569, 0xc) r18 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000001b00), 0x80000) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001b40)={0x0, 0x9}, &(0x7f0000001b80)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r18, 0x84, 0x9, &(0x7f0000001bc0)={r19, @in6={{0xa, 0x4e21, 0x6, @local, 0x9}}, 0x7ff, 0xbc, 0x67, 0x9cb7, 0x88, 0x7, 0x6}, &(0x7f0000001c80)=0x9c) r20 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r21 = accept4$inet6(r17, &(0x7f0000001cc0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000001d00)=0x1c, 0x80800) ioctl$LOOP_SET_FD(r20, 0x4c00, r21) [ 264.500216] chnl_net:caif_netlink_parms(): no params data found [ 264.694939] IPVS: ftp: loaded support on port[0] = 21 [ 264.705011] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.711835] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.723514] device bridge_slave_0 entered promiscuous mode 03:38:56 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0xa2000, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000080)) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x5, 0x80400) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000140)="b955e79088ca966d6643fa9d30d5a642", 0x10) syz_open_dev$ptys(0xc, 0x3, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2a200, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x83, "7ee01fb56e9614efccfb56e3ded4592c834380f479ddb83c1336b28c93b2d87f54305e40c3fbcbf34862636d5f94b41dfdfb3209d5263ba298cfb01e86eb5eae511f90f26259c947f39ce0f6b8c5053f1adfbb03b994f8dd81e7acff873afdd75d8a89cdc75f999f465e24169e52009e4133041cc99bacb5164c026cd2fe6105b5a218"}, &(0x7f00000002c0)=0x8b) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r5, 0x4) r6 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1, 0x8) dup2(r6, r2) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000380)={{{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r3, &(0x7f00000005c0)={0x90, 0xfffffffffffffff5, 0x3, {0x2, 0x1, 0x8, 0x10000, 0x6, 0x3, {0x5, 0x80000001, 0x20, 0xcf, 0xc11, 0x5, 0x2, 0x6, 0x1, 0x5, 0x5, r7, r8, 0x2, 0x2}}}, 0x90) getsockname$tipc(r0, &(0x7f0000000680), &(0x7f00000006c0)=0x10) io_setup(0x5, &(0x7f0000000700)=0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) io_submit(r9, 0x1, &(0x7f00000007c0)=[&(0x7f0000000780)={0x0, 0x0, 0x0, 0x5, 0xacc, r10, &(0x7f0000000740)="8453d571db56ce79b3358da771", 0xd, 0x9a}]) r11 = open(&(0x7f0000000800)='./file0\x00', 0x240280, 0x24) ioctl$VIDIOC_S_HW_FREQ_SEEK(r11, 0x40305652, &(0x7f0000000840)={0x4, 0x1, 0xfffff000, 0x1, 0x4, 0x3, 0xfff}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r11, 0x84, 0x8, &(0x7f0000000880)=0x9, 0x4) r12 = openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x40002, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r12, 0x84, 0x20, &(0x7f0000000900), &(0x7f0000000940)=0x4) mkdirat(r0, &(0x7f0000000980)='./file0\x00', 0x80) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f00000009c0)=0x851) r13 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCX25SCALLUSERDATA(r13, 0x89e5, &(0x7f0000000a40)={0x44, "0d46d503ec4bdba7a44753d72437fe90cf491d475476140f70cce1eb291055f7af6e89f17ff1ccd75993c86a19852f40dcc60628f400cdb538df3beb8296b130c0b04763d265757691a80623fbd1387d408b1f46fde6c2c64148b8d84e91b28f5873ff01b5956317c18f54e55c2823496f08cbe1bb70dbcf077f6f7d21307e64"}) [ 264.748320] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.757015] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.765906] device bridge_slave_1 entered promiscuous mode [ 264.820781] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 264.844835] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 264.924702] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.934542] team0: Port device team_slave_0 added [ 264.961804] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.972130] IPVS: ftp: loaded support on port[0] = 21 [ 264.979880] team0: Port device team_slave_1 added [ 264.992120] chnl_net:caif_netlink_parms(): no params data found 03:38:56 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4402, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x40000, @empty, 0x3}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x1}, 0x8) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000180), &(0x7f00000001c0)=0x8) syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) r2 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x600, 0x70) getsockopt$XDP_STATISTICS(r2, 0x11b, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x18) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f0000000300)=[0x1], 0x2) set_robust_list(&(0x7f0000000440)={&(0x7f0000000380)={&(0x7f0000000340)}, 0x1, &(0x7f0000000400)={&(0x7f00000003c0)}}, 0x18) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000480)=0x40000) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, &(0x7f00000004c0)=0x3f, 0x20, 0x5) ioctl$FBIOGETCMAP(r0, 0x4604, &(0x7f0000000600)={0xf6, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0]}) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/checkreqprot\x00', 0x8400, 0x0) write$binfmt_misc(r3, &(0x7f0000000680)={'syz1', "a695e9"}, 0x7) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x1c1000, 0x0) getsockopt$inet6_dccp_buf(r4, 0x21, 0xd, &(0x7f0000000700)=""/4096, &(0x7f0000001700)=0x1000) fsetxattr(r0, &(0x7f0000001740)=@known='user.syz\x00', &(0x7f0000001780)='syz1', 0x4, 0x3) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) restart_syscall() r6 = syz_open_dev$mice(&(0x7f00000017c0)='/dev/input/mice\x00', 0x0, 0x400840) ioctl$SIOCAX25GETINFOOLD(r6, 0x89e9, &(0x7f0000001800)) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000001840)={'dummy0\x00', 0x6}) r7 = syz_open_dev$vcsa(&(0x7f0000001ec0)='/dev/vcsa#\x00', 0x1, 0x408000) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000002040)={&(0x7f0000001f00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000002000)={&(0x7f0000001f40)={0xbc, 0x0, 0x1, 0x3, 0x0, 0x0, {0xa, 0x0, 0x7}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x3}, @CTA_LABELS_MASK={0x8, 0x17, [0x5]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x80000001}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x5400}, @CTA_TUPLE_REPLY={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_PROTOINFO={0x48, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x44, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x62}, @CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x2b, 0x80}}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x11}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x60}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x80}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x2}, @CTA_PROTOINFO_TCP_STATE={0x5, 0x1, 0x7}, @CTA_PROTOINFO_TCP_WSCALE_REPLY={0x5, 0x3, 0x4}]}}]}, 0xbc}, 0x1, 0x0, 0x0, 0x1}, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002080)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r8, 0x8983, &(0x7f00000020c0)={0x2, 'vlan1\x00', {}, 0x1}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000024c0)={0x0, @remote, @loopback}, &(0x7f0000002500)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000002540)={@empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1, 0x0, 0x2, 0x800, 0x0, 0x9, 0x20201c8, r9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000002600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000025c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r6, &(0x7f0000002640)={0x15, 0x110, 0xfa00, {r10, 0x8000, 0x0, 0x0, 0x0, @ib={0x1b, 0x1, 0x5, {"6798f18cd527923f14bcd64d6932014b"}, 0x4, 0x53b69819, 0x100000001}, @in6={0xa, 0x4e24, 0x0, @loopback, 0x2}}}, 0x118) [ 265.072880] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 265.079176] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.137109] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 265.176468] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 265.182993] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.210305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 265.247320] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.261898] IPVS: ftp: loaded support on port[0] = 21 [ 265.263157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 03:38:57 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f00000000c0)=""/194, 0xc2}, &(0x7f00000001c0), 0x50}, 0x20) openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x501100) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r1, 0x9}, &(0x7f0000000340)=0x8) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x3100c637afe808d6, 0x0) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f00000003c0)) setsockopt$sock_timeval(r0, 0x1, 0x57, &(0x7f0000000400), 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000004400)={r2, 0xfff, 0x30}, &(0x7f0000004440)=0xc) sendmmsg$inet_sctp(r0, &(0x7f0000004ac0)=[{&(0x7f0000000440)=@in={0x2, 0x4e24, @rand_addr=0x4}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000480)="fe342bddb93c30ce5b216bdc2a568cc5aa752170f12ac60e725b5c7b0a47aff9cf6b5261008b05ad41890e64f7b330f402c825a00d92fba3485486064032552fbdead41d822ef79025dce754c372f318430e8e190a5a53f59b09b864cbe17a8a23cf4586f28a844466e7440455fa68faa1df0af5ac77fa5301817b8b14e10ece2b86f9cc86c10de27be52ab55be4a5c68ea794e2d0c23383349f22c87537f0bfd9007c92b4f21019e1c5efe345fa230b00481ab621d817486011e5c3d8274b91194143c5d625fb3795088c939d6bb535445eba8551a81de463884dc2e17aa286a5e543a48c5668483f45a613353d", 0xee}, {&(0x7f0000000580)="12e002ea562a2f0735da80cb96ca3e9623bffd574f90f3107a0d1e5d555e60a5a53359cf6fe7e9ca9faa1010d9c7adaaa157a28442040c8eb45cb274123ed389850c8dfdd6e7559b70751ee7c2f213130832dda68e0261ef376c0b77687dc171152d59fc33aeba2d98640621c3f2fb1f5a22ddd625c3a052881c7cc9bd2bf643c87d3384d159e6660e2e84b3", 0x8c}, {&(0x7f0000000640)="7ffcba0a1540c8aedd24065438278bfde4e5ae6e5f0cfc77e0ba3f2b3c17341cfc6312a55c875c86a941f5e34030fe6fcbc7a040", 0x34}], 0x3, &(0x7f00000006c0)=[@dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x41}}, @dstaddrv6={0x20, 0x84, 0x8, @empty}, @sndrcv={0x30, 0x84, 0x1, {0x1ff, 0x9, 0x820f, 0x4, 0x40, 0x80000001, 0x310, 0x1000, r1}}, @init={0x18, 0x84, 0x0, {0xfc00, 0x8, 0xce3, 0x4}}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0xe}}, @authinfo={0x18, 0x84, 0x6, {0x9}}, @authinfo={0x18, 0x84, 0x6, {0x4}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x8}}, @authinfo={0x18, 0x84, 0x6, {0x9}}], 0x120}, {&(0x7f0000000800)=@in={0x2, 0x4e23, @rand_addr=0x200}, 0x10, &(0x7f0000000e40)=[{&(0x7f0000000840)="8f5cad889d7140cb13089d3435fbae0327c378b7fb62962a7dbe8a7e9b6f75732537e42875fca59dc89d10e41003642a46878d5748e8b803309d569d2253c70e029e3030782a8b7c1c00b07cf79062a5c1c4bbba223e104e92ca975c646b5e5218fa651f3fdbe5118e5b5467aba77b004ac7cc0759", 0x75}, {&(0x7f00000008c0)="9141bd57b26b0692d2a241fc7886220fe9555daed7c4082cfd96e363c8f84ec37d0283719b35", 0x26}, {&(0x7f0000000900)="c0be9edbcc3c3fa12826dd073b254af8f51e82633c9ba3aa4ab7059e8d9c79cbdb2c990a69a95ae064f7a1dc3137c4a22559c6bcd3c43969789f274658afb33337bbbcbe789cb13c2637f52f7bee51e3550a410593414b8b580b4ddde69721317a904bfb212af6c2567d16cba986a98569245b333fc9e350550caac3ea57607839024c41806e232754a5df1a0be5935ae829f73b7e2f824356a071d447706fa1ae044fc85e151200644b11cabab7cd2fc6902c4fd34c685342c350ce80acde6e7ff0b2feeabc43d363247ec37399e2064c6e", 0xd2}, {&(0x7f0000000a00)="95f026cf240245d0adcf397252c9eb3f34dd869d3d34376caa32cfead75ef8db99c76b71b1e45818baeb6c2d94522e8f988ed69500078beaf88cc8", 0x3b}, {&(0x7f0000000a40)="79f8ae2098b5d34bdd7d710a0830241df7bd471b531e813de17b05591500c40b2737823c840b061c8740b996b746145198ed9cd3acc1320fc32ee6754dc61240dd46f7edbfd2cd6235b69abd24d49f059ae36665075960905ec314069895419b3ad0b0e5d180cf2601cd6a3160c58013dbc81ceb192f5b20b263e7516ea86a6708f0d33e31ee7beaf4eb23a4d35d56997a89b237fd9d230cfcd71b94a18c0480456551fca92d6555ed632f462add4f2e9d909f5f70f076f94c", 0xb9}, {&(0x7f0000000b00)="a2e736eb1494143a015de1bfed38e6be1aeb74e49643d85d8d37b43406a9faf356c7c99bb2a443657add3b5f88ff7aadd0001b4f898358b5c71beda974babe7bb028e8b6913fdd2a596df26573e93d11872d179d945e0a3d7cec1c7ff2587ebbd1d4377da365e3d85d117533a9e70ed7fb57fd3d9249476c91e1badde1906db72d9aa9dc49e6b01ad53032ce4450fab9350c64ee0c1a859816e5afd59d5a0192b243570241358610b0be5fff1dfb3cdfe1c42f4c05e42a9149c922ab5739910c56ba8b3ce6a0018563b856a17862161a892a6428", 0xd4}, {&(0x7f0000000c00)="106469e3aa65e33d06f9dd9f5c2cbcd53d9008eb00f293f84d0f32d800a16f5c1453274431fe730cb5af4e38826d6673efb57d9a3ae3a4defc0da433786b82b83c8fa73dfbcbd3cb40a744e3b062c5c61cb42da9887c76199ca15a1692fac8b744c9c6ee051a3fcdaa73612c6a22d5ebacf78b6cbc2921992dfaa0dae6a14e82b18e7decb5d80ccc435ef6c6b5d92a4e300ca0ef624f9f28b72d249e23bdd74369", 0xa1}, {&(0x7f0000000cc0)="ada0531adec2d2b5f5192b11b2dd42c613f69b7cdae5c1edd76ce27587b0d637bdb83dddc3b193c5dee7bb3a1e4de9318c520e640ac3d6604ec08951da2f31fb407a235551", 0x45}, {&(0x7f0000000d40)="57838820ae9d50e6a9ec11cf48526b0b24298373ae4796c71ad05fd763e09c6a426fd69261e232cb196100a062db98e339409321dc97f09849c3069991e350cd12d052552d95224d46fe68a56d7b2f61144a8a528d1e119d4d9dcbf54da4780b3b683fc0ea2a0a9231e7ee779e9efedd5d3a15fdc3b9d739a55f980bbb29a6db5bf74bc461712f1bdb684a86f787c28fc9fac1355c9c6e84b939aef53b14308bee7bb589840e703ddaeebecbe72fd3da5df9b188dc68c0d5f60b4a937f7ef7c050c8013cbd46b2faceac1a01eadedd22", 0xd0}], 0x9, &(0x7f0000000f00)=[@dstaddrv4={0x18, 0x84, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x22}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffffff}}, @authinfo={0x18, 0x84, 0x6, {0x2}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x10000}}, @init={0x18, 0x84, 0x0, {0x80, 0x1000, 0x9, 0x3ff}}, @authinfo={0x18, 0x84, 0x6, {0x44}}, @authinfo={0x18, 0x84, 0x6, {0x7}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x3}}, @init={0x18, 0x84, 0x0, {0x7, 0x7ff, 0x6, 0x2}}], 0xf8, 0x4008081}, {&(0x7f0000001000)=@in6={0xa, 0x4e20, 0x200, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, 0x1c, &(0x7f00000042c0)=[{&(0x7f0000001040)}, {&(0x7f0000001080)="095024540eb5f71425f5717c3d5a0a190f528dcca5d82c3958e51aed01a77ccb53601889b6601a4e74ff3646c045fd306eb1ebd937a9685d18aa03df47a9f77134f2182b4b6c08adb9ff722b12833d22c0ce3c091249526c25e635da948aba188045068334b7140d79c5754b0a484514641ed9653b87165b67e210cdddb319cd99fb9c4ce15813b77439ae5bb77e0a858b210458fbccb8c30d87f85b7d1f12daf70cd949315204f94266bd245ed3fd8fb27dd2f4566b2462b633adbed0d4b43880614f1f16371e4a488ecaa0352371319714bd92781f5978d86e562a06815bad", 0xe0}, {&(0x7f0000001180)="0397376ad99a52c722266a205b16a981eedc61bab64fd9c766332a96cc28fa574c0e8f83758717c61be24c11c1736b33571f2717f8b587d10960779b9e3becea7d65ef9c33d3eac96abb1378cf2181f53bd7fc5f82f3e17b66a7d58f8783fbd0fd7684463353654f7cea831137321e1c23be7c53f724589d700970be521f84871443b8a9ea78e00fdbb5f08106dde2b7359f0f1f5e94714c38dbd443074ac1ba48e9f4c1c451a2f64159cc2fcf561e090c8abb47d2835b6981361578bc0d688ac52df1d802568c05f01bcee81417b4528b43ffff", 0xd4}, {&(0x7f0000001280)="459b469d4c6f708c4c9ee09139d979e3357b374febff454f57f25ac0de139aad7f92d29060632a4f1f28fb9c0429420e4d527f0935ff0f708c79683c60f2d4ebfba506890beb50c83ad91ca39b147f4cbcc4af8835716a71d9d1b21af94f8e94870ca559a907311bb2c65e899a7b8b082d03a584e662430d88e06d1b349c194e3fdc078e0a73b4c078ad0a7c7beff8ef0981d3f08adb97394245b08d34fa19d2dd581ed5631b8857722ad8b59179ec95d5dbcb148acea5ac502dec6ff101d092cd118332bcd566f66b6e95b95e945ecbb70d7dd905b1b8359af2f15252d96e54823dea513d63c26e4a5578926801d1f6867c057337388a4a719c0e805dfde98b669a7ad5e768591d388742580d79e56f7950e38bb1b18d4af18825f6eda1bb89b0132e511c84fae29c384b6e78524d48093711dc15ec852fa71af4b36011b03b69ca7191e42c0be8b9becb6d35a359920f5a780318be6923bc9044410652472d0b8c9863c1b6d3ba90ef08d06542dd5935bd2f178b411beeae2ae5b70173e9e23233840132a80417111f18d7f5ceeee170664627ea201d35af540ec533cbc8c0563cac69bcb3d6ee8650d43403bb12e0edbfa52f97d786bbae9252f0ae4600bd9f355266b2c6ba8f2ab51c88a2c4eb9afd8824fb02dd575c31426af43c5276d9325fe20c6088ad893211763886a63fbdd16dc0fc886f82de9108d2cc8a8d596e678fedc3c556bc125eb455b86bd6ddf9671c8afbdbc44b1152d79662b7a2ea32a755242692fc724892db7de7ba3e43b2cb0adf5e2172a304ee26f39240fbaeb6ca3f4c899922540ff4d50ccdb5b79eb62b85985aa6fbe15e73fdbdca8d30d09f2d55f7c573894ab5c19d227e1a7f357da842db836207052aacebafe7e4ffef5cec074e8f7ab5903b16a9c7e9e044813634b13cba0042189190795c78cacab9e98677f052123ae9580fcbf8aad9b317858405c5e2da2724afbf386bce8391509aec93184f36c8f339810c1ced6b394e2dc145ba39c9f6d4437097d15024bb132b7604162f6fb69dcf093bbfe6e43442805b05506de8f8c2efcfe39fab32a0791c16ef42241810c6f5096abe634576232f4932a477916b030d3f4a2446b93c69ab0aea4e47d141bab67fe891f5f7166da23f242e2ad84b310d3a832ed0c12993c6efb65b1cc1e3e1ed5967b95c9311f13433d0b383c2246dc5ac03556aca9f420550a55a7fc3001919e5b656cb44729f4aef11e1a97701d33c3ee7930f1fd609e690d794f8075de9a162f759283a3148f994fde4637cffe437550b5d27fb917feb00a64321e60c2bd24f5ce6921b245cc844ff7b09107b5ea5e9530dfffc21e022121c698698ade1b59fc808d01061eb85571caba49052b7a16466c31e60541b81614646ede1cd0de563896fc71e139d8492bd2c004f8cec4c241801f2b1adf498bc086e0d20bfe6483fa318a267458167dcbc1edafb9fcc74875b5b6caa4634c3659b99563e4cfa2dc35cd3c60ba5d667332fe65024299eecf8eaddcd476def9f0222318fb385d5641fb1bbb47600e66433b0b3e48c44c272f62b3343e9ed8059c4209478da7f36cb7a01bbc140a898aa21dba135440e116cf17c180d6d2ea4479f143874a5ea496618bbce4e4d6388d4f06f35b56aab62d7c756899923e8e81338e0877e86d00fd90c62d812de9a47aa709900e91dc76a9fd00d2774c2ecc3891d3cc5ee925b3120420bd2277e329f8965ee9fcc8e9ed88ea14fb0ecd000bdd78ca6ac2659208dce4a2b50a362e28a50329d004730fa5e9d5fbf013991d8fc24fb82103e3b39e4fb181cc2daa6c932789e82eb4935456fa680ab729c34b7df6dfaf50b55a2eed84e80a448c6a6f974f5081fd5634c13906bc595acf7821ed14d6c4a5e5506c2f8a728b8d0c1028aee4ba5538f1a877575a448be5cee54f01dfd5475d5cbf55239cbddb48f79ba0c1cc98c689826e3de8d76169e4875fda953a29570227277ffc4915583710f23dad1e36ccd3e10bfd7f784e9468b9077e129788b4b8cf7994b99bb3e80b21dab151d1be4eb6449a2f396bcdd62cca3b2219f9750cb19c3e936e1505526d86be66136b39bffe63cef66986f07d61af2fe87183060f9e6a729773f3a85fa77ea1e19fa51d4710928263e58e3d9a7534c35e2ce8bf676bee6535bccadfa46521c5deda04123768b20ba99dece4f251cbefb86ec4494070984f716fb0e6f887c83fd1f3d3789a6999ba759903cb444c2a91ac17ad53c4f0cb6305af8f3f4345ccb0b1fa3630b984aaee2f30e1cbf29ab826ef622aa541460b0d96ebeb5476161c434d557fab97350d16ac1c7c127382139c0eecf816525bfd672de0c50d2e965531bd31086d17bc0469c16ecbd7b3250b97d137ad4069d5cf296953c1735a5fa02915e465d283e30183c5bbe8fe772c49b0a2b6fe13c78643fc9d9bf11be99230c4c4accc172f1015dd1fba3d2cc6e34459a8aa9d5c7d3738c2639ccb02bd6246856865c08a096af51528b4f06900f949bd3062d33325bef90f836176545b2ba32e67c8d3f24f660dcaebdfb9dba21ba14082177be7de9651d7cebb921d9214d9af09a10513233d39722cfa59c5d1f754c84bbf6cadd36ccf3bc3428da6805e8248ba512ad733c963cb18ef858b3f56eeda308439fe51bd686e7c7ee27398204514ca16fc02d3f5d95f549153e60bafd957c134351efc4c8f2c0430f486570fec73334e4d8a13a880cea024ad1e57fe1e772ec217cd12fd1c70894bd14754cf353436b5f1f2796b8e4680b3985d692944ff2ae5c9ad3fe0a256b75269c4377ec7ea826f5fb4ad49e481d5650d5af060f20b6a0ec61319564795d968cf8563e7e58206b6e15a306e333641ebdb6f6b6669c497ffee8542c8e499ceb478e87432c3fb1f022111f97a591848ef2f5c811566c538614dd0a3dba49128f0d51c4928ca0763fd412bd63255584145ac1f7f3144b2209ca714b19dbfc0e610a2a96d50a93667e0dcb3be75ef33115170282bc511d07593008233223e9987d3cf29e0512ccdb44496715703c9020c5953d4c5541ffd838e503c836c355acf05784c7dc3dfab5b94bcdf88860704c5080c48c27191988ad0a2127adf1b966e3f63e06424bec06154f2c141bddb4ba17b17d3e21cf62496616b3348746925226c081e63756c82549a8150d23cf75e632364ed464b0ad6d78a85a2109ab112729a622bf145a2af4c627beddf2db008f4953072aa6f8fc6b9a4074b200f979c8a136f35bf0b9f8fa8fdd27268445caa45b7a2e014cde366b20d15f8a83d66e6b43a0b08eeb1da3b71f4787ce0b9b8c45b662dabff8d8262b1f149ce530ef4c8f51c485981c5b6ad17f116a07fb6a2d885d689b392b70dd9a93b13f272b785629497b5db53dee389a949954ff840ed2a7931bf71359191bed5202c6507b8eb87cdae66e5f9af0319ae88a18379bcde625518cb5a33c29c1b6ab832903c47c1da4742ae9ca744ca5be9b5b7d5dbdeaa2485e3ba934742feef44ab43547eba2c57ca93eeaff42721b03b92743f3921d3cdb6765213be4cdd2db689b98dad5158fb8f67b9bbed32ce4e252504995aa16951471fb8ca2a1fccd161543f8eeafb9e4944c5ec9541ef93c68caba670a6be4618501260c85f040aba65629b02530a9b040cbf7bea5edcb875c601b1b3328ccf4c4bb1950b69d0cd343a381791c3285f922d1aeb8183e50f8929a34b8a2c864536b4c07bb3cffb8a4ead067669796440718cfecf0de656b21cdbda5d0d6ccbcfce51b3e436e0ba941beae71a392b9ce2162b5e4df8a9ff98f5ac264bf2a76d113cdd69bde6273e5133b6559d6311298dc47307b238aadcf8f3fc376bf1062b8ad32bc76ada51b9153ffefa37faf81a683208450daae47400a323eb1caa6847cc28a11e68b4040424b54e9bdef79b7e7c92c33ec2dfd79df828c273693213b4662df39bb07c2d7edb591ec7377f686637d780aaf01ceed8e02e366425813cc6374fc45ca9dea238143a27f7eeeef51fd378845830d44dcb865f54f6c36d3f5a590e37619cc23569b39ff04bb3c25df3af31e6bded96511c8019a6a625e6bf832144276d9d95f103bbc92d30ee7b89b422cf4a24063abf5f7b334c7f88eeadc61e96293feed3dbd9bd6419f1c2f54ad3b284086cbcd2f8cae6061063540af2e4613d7c58fa4d762c625af6f5e4af01ac36064925c33fabdddb7924cd061d19b402139b0cbb54ffa8b6a23f1039dea88b9e1f7ad1a2cea93532be89844a303be534e173b7b6433c7622e5d34040146353cf89c718046253172dd33de02f48b479d0d1ab9e98f69273a952d0f503a589d58ead70a22857c0f7cac50ec6ad135e129abdbb4b3e476fedc824c989c8a44b691df1d3b30c9df5d3f85fccac371810c8dd89fed67bef111af94ce90e8470ce9855e865e12d8a04f3b7d8c504d50e63b754f6519f7807a61dede17de62500d25dcc761a1402df8594ca3874d3a19529dfcc72e1bafc653eba19e0a5d771ebf948da1b55a52a4db0844f8375dbb505820a1ffe359d6826b3b5ff204e27f5272342768e5857da7e3285a59bfe3270013546d2ead6c4d9832b362c787fab368f716a259f025a0aa1aba1c5927c8c1d96aa7859ffc36f1883794d512da5a3cd75dd1dfb603fb1a05042c57bdf1c2f42f7817480acf3850e2b90b44ad438db433072423e43d96dd733d39b77a58a4cf619c104b8ba74eb8c8a00e627b9bf36c1953dc65492f2c8e622bb7090ec1fe62420ec0781cf104c6710a22a8936fb9ba3d2868d5ba0c8b1a6538d0933bbb04240982524b64984166d5af8d04cc69ffc844d74ab8ed5a141bc66e0863c1455936761c709ad90c2b3e2b51799def22053c296b4fd4850db129f3a20b5196ee76944b1365247118cf2675fb764243fdf29ae02f9214bf6bc1323b93333dfa5c6641eb4aa5496adfbe5fddb81ee4ed2ccecae09c558162d1edcff98e2966968e80889d4459ff05edef13dd67b6905ef843f71687a5cfc525c8032014e6f53718109aeb05a3e4b67b92a0f267cb52062d4f0ce5493b77ad9c2b6b4aa097c2d7fa13ef86cf48455d94084c2c6ec9a3da6c5b42b9e955f14239c27aa25cf43a4b14df966fd8a72a7c85ab91c1298ee66643c6ffa9774bb9158d714aeca27cffdc7171ae4584c575f074f51a848c7265c14b0b3f7ca6db3d236fbbc6e2e42c3954b9d3d1fd2601f594a10ef991c54a8bb059e2e37b2cae50b7143df51e8990fe99b9e577bd35f828737374701a0552a01f27d6bea13498c3abcf2ba7c6c536f3ce944b43811ca4e179d96342ad9c721254d8beb74e11266caa0b20ec573705c16b3a67e71d7d991daf7d80b323e530c870f4069e4832d2fab55f3f94eee6acafc7bbb3934f3628a5b31efb4b6f5c74d8f91998620d202d0cc93cf93a831ac12411e955501f3ab76a2419eac49efe035f4ad1ad7be79c72a1368335b267e68b22caa32e35ac616ff4ee782a4ab236310714a550b6f340b75d2d78a0b195ed804bd72838f577c1c055884edd5404f8e629436a26a5b66aa7aab287526958bd43edbe651a6ddc8df167e571278367f047a8d54825ed24d98b4b25c12f702448ce584caebc24f13ba5ca41bcdbaeff4031246d5373229f260bb334fe8ddaa8eb988e5b244cdf41f480fd5ced36005754c9035cce5c8f1bcbd5923c8ef429b0b5003358ae0f34d4bfabff79d64a4b3ed0d4f4e4717790536c521e2a61a674562f36c7b6e78951b1ad5643128485b58f6428efacba5694c2", 0x1000}, {&(0x7f0000002280)="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", 0x1000}, {&(0x7f0000003280)="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", 0x1000}, {&(0x7f0000004280)="9db5f79e44bcb10e9ed1cd1f888bca695a22c678acc100f2470f727a641f81db41c96af1d96984f59a40ec1740caa357f7088cc31d50", 0x36}], 0x7, 0x0, 0x0, 0x4040081}, {&(0x7f0000004340)=@in6={0xa, 0x4e23, 0x7f, @mcast2}, 0x1c, &(0x7f00000043c0)=[{&(0x7f0000004380)="c07149b59b7f61dca13de6ed22047b1a05fd00f3bad41c3a9ac982dcc2b477f4b8f4704224683e5cf86806d8d1732f8f0a", 0x31}], 0x1, &(0x7f0000004480)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0x1d93}}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x200, 0x0, 0x80000001, r4}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x6}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x200}}], 0x68, 0x800}, {&(0x7f0000004500)=@in6={0xa, 0x4e20, 0x4, @mcast1, 0x3}, 0x1c, &(0x7f0000004980)=[{&(0x7f0000004540)="ce13f68a17e158b37a3dd048ec2b8a4525b1ea7d21a5038d796bf42d5ae99abaf18c2cfc141c1e0c9a43bd5fb0f6da68c92183c1c731e37e94d3ebdf38cb69864ef51ff215b32831c8929f441a23643b4deb30347fcdeb31533deb9f0d2711fa3b6749b5b3736bfcd9e26640878aa9fea9ec35edfe33817d2b97c23a2a941aa44812267c9cd41d1053f2e8b2d30ce43aee2d617ef73c321ceaba85ccf92f3a2e4edba70db4f16eb23a8394e8c6ec78bb9bbe", 0xb2}, {&(0x7f0000004600)="4ae9478533573fbfcda2d8941fb9", 0xe}, {&(0x7f0000004640)="3f3ebfbbc9ef042294fdc120ca644f9406278e4bc028e20a563e5b46faf2bd9093ed59215d96666433f58298cccd7a5a8e14ed1ac56ebabcd5675baabe6fe2414f71807786d6eefa0c7477fcdf96a88a04dfaeece339d313a9fedd742268b8cc914f4b02fa95df5085ef47814f8f499a9f02e0afad8838e719f958b34eaf18b5aa1d80611151a4b847f13934046e0edd8f9e686647", 0x95}, {&(0x7f0000004700)="e01649ebbdfe530858b59bad60b217bae911ed8377bc301793ecd81aabd13261f32df4442c21043efd25d422a04efd47e47e5b7fdda2eeb5c3ee01579f3802406eaf3c0e840e17d74257096ce05044edada96b432f67ef58f401b861b4555a", 0x5f}, {&(0x7f0000004780)="3afc9b9f27f5380c4b004d5c3cc0c15cacb05a", 0x13}, {&(0x7f00000047c0)="7202f337b082e37464b965007cc2cd566dd89bbddbca6ff773022b1e30209ea5c3e7e2d995af9693f25b49eb5593e78ca1e7c1f2639a6a3f6a6910f3e9bbf033832022cc646c8c6204d07553944d158799e8f8d99df7e776158bdc1aa17c9f07d2ac5d27ef52eded91b4a18b732fb5f59890a57510ad9edf7b938e267298eb52c47d5967e7fb20276a160530bf1b4f669009dc39ae33c26da405c73469dea35795d1218fdaba9bb274db9d1a7f8bd94f232d30957a5bc80dc9bd4f7705f452e8bd91f9c002d81a66ce33737b71f25617e78c", 0xd2}, {&(0x7f00000048c0)="b95c677cbb9b6c4203db02099594f40bee7855e8e911b5f8e2da5a54cde31fa23ce0040e4bff70e999d2a97264a40e3a77f15664096fd32cf627eee2c5f5dbe9838ec7ae52e6c77e73ff00725892218ad5faa926c2ded22ce5110c58fe6a76c25c9b0e4e8d1a47d564ded1d4271a183123680c17fe88c9fb39502f7143dbecbb688e2160c6f040b8e4e21cae2834b9017f013db570d2d70c5e0c33f4", 0x9c}], 0x7, &(0x7f0000004a00)=[@authinfo={0x18}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @authinfo={0x18, 0x84, 0x6, {0x7f}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x4}}], 0xa8, 0x40080}], 0x5, 0x4000040) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000004c40)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000004dc0)={&(0x7f0000004c00)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000004d80)={&(0x7f0000004c80)={0xf8, r5, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}, @TIPC_NLA_NET={0x50, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_MEDIA={0x28, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x60cd0fda}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0xf8}}, 0x41) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000004e80)='/dev/ocfs2_control\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r6, 0xc01064ab, &(0x7f0000004ec0)={0x3f, 0xb88, 0x2}) socket$unix(0x1, 0x2, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000004f00)='/dev/urandom\x00', 0x82, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000005000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000005140)={'batadv_slave_0\x00', 0x0}) r9 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) sendmsg$nl_route(r7, &(0x7f0000005200)={&(0x7f0000005040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000051c0)={&(0x7f0000005180)=@bridge_getlink={0x38, 0x12, 0x1, 0x70bd28, 0x25dfdbfd, {0x7, 0x0, 0x0, r8, 0x4, 0x2088}, [@IFLA_NET_NS_FD={0x8, 0x1c, r9}, @IFLA_EXT_MASK={0x8, 0x1d, 0x142641bc}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x6d}]}, 0x38}, 0x1, 0x0, 0x0, 0xc804}, 0x4010) newfstatat(0xffffffffffffff9c, &(0x7f0000005240)='./file0\x00', &(0x7f0000005280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) write$P9_RGETATTR(r3, &(0x7f0000005300)={0xa0, 0x19, 0x1, {0x1, {0x5, 0x4, 0x5}, 0x24, 0xee00, r10, 0xfc00000000000000, 0x5, 0xff, 0xcd8b, 0x6ae7, 0x3f, 0xa2, 0x27, 0x6, 0x8, 0x9, 0x4, 0x3, 0x0, 0x67}}, 0xa0) r11 = msgget$private(0x0, 0x0) msgctl$MSG_STAT(r11, 0xb, &(0x7f00000053c0)=""/139) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f00000054c0)='nl80211\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000055c0)={{{@in6=@ipv4={[], [], @remote}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f00000056c0)=0xe8) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000005780)={&(0x7f0000005480)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000005740)={&(0x7f0000005700)={0x30, r12, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r13}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0xffffffffffffffff}}]}, 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x40) r14 = openat$ppp(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/ppp\x00', 0x101000, 0x0) ioctl$PPPIOCSMAXCID(r14, 0x40047451, &(0x7f0000005800)=0x800) [ 265.426394] device hsr_slave_0 entered promiscuous mode [ 265.464750] device hsr_slave_1 entered promiscuous mode [ 265.516210] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 265.554395] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 265.571121] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.578566] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.586965] device bridge_slave_0 entered promiscuous mode [ 265.597658] chnl_net:caif_netlink_parms(): no params data found [ 265.622481] IPVS: ftp: loaded support on port[0] = 21 [ 265.630080] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.650247] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.658326] device bridge_slave_1 entered promiscuous mode 03:38:57 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x32400, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0xc5, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r1, 0x80, 0xffff}, &(0x7f0000000100)=0xc) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000140)={0xfb8c, 0x1c, [{0xc}, {0x0, 0x1}, {0x9, 0x1}, {0x7}, {0xb}, {0xc}, {}, {0xb, 0x1}, {0xc, 0x1}, {0x7, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x5, 0x1}, {0x7, 0x1}, {0x9, 0x1}, {0x5}, {0xd}, {0x1, 0x1}, {0x6}, {0xf}, {0xb}, {0x6, 0x1}, {0x6}]}) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x0, 0x400) r3 = dup2(0xffffffffffffffff, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x1c) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000240)={r1, 0x80000001, 0x1ff, 0x20, 0x0, 0x44, 0x4, 0x6, {r5, @in6={{0xa, 0x4e21, 0x7fff, @dev={0xfe, 0x80, [], 0x1d}, 0x3}}, 0x0, 0x6, 0x3, 0x20, 0x284}}, &(0x7f0000000300)=0xb0) inotify_add_watch(r0, &(0x7f0000000340)='./file0\x00', 0x40000080) ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) arch_prctl$ARCH_SET_GS(0x1001, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000003c0), &(0x7f0000000400)=0xe) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000480)=0x7f, 0x4) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f00000004c0), 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000500)={0x6, 0x4, 0x4, 0x20000, 0x9, {0x0, 0x7530}, {0x2, 0x8, 0x7, 0x56, 0x0, 0x2, "dd500973"}, 0x5, 0x4, @fd, 0x0, 0x0, 0xffffffffffffffff}) ioctl$VIDIOC_G_TUNER(r7, 0xc054561d, &(0x7f0000000580)={0x0, "ec7aa3532e2b88ffa150e92468d9c180ca7548f66cb8bacf91367fbee9e195cd", 0x5, 0x20, 0x8, 0x800, 0x10, 0x2, 0x7, 0x20}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000600)={r4, @in6={{0xa, 0x4e22, 0x146, @dev={0xfe, 0x80, [], 0xe}}}}, 0x84) r8 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000006c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r8, 0x541c, &(0x7f0000000700)) ioctl$KVM_X86_SET_MCE(r7, 0x4040ae9e, &(0x7f0000000740)={0x1000000000000000, 0x6000, 0x6, 0x9, 0x14}) r9 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r9, 0x1275, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0xffffffffffffffff, r7, 0x0, 0xe, &(0x7f00000007c0)='cgroup&*ppp1\'\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r10}, 0xc) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f00000008c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r11, &(0x7f0000000b80)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000900)={0x208, r12, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x108, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x62}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x12caf545}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x94e125b}]}]}, @TIPC_NLA_BEARER={0xbc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x4, @loopback, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xfffffc00, @loopback, 0x6fc8}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x33a0962b, @remote, 0x1}}}}]}, @TIPC_NLA_NET={0x30, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}]}]}, 0x208}, 0x1, 0x0, 0x0, 0x40}, 0x400c0d0) geteuid() pipe2(&(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$SNDCTL_DSP_SUBDIVIDE(r13, 0xc0045009, &(0x7f0000000c00)=0x5) [ 265.744147] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 265.756816] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 265.825220] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 265.836993] team0: Port device team_slave_0 added [ 265.865585] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 265.876611] team0: Port device team_slave_1 added [ 265.914976] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.922166] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.931351] device bridge_slave_0 entered promiscuous mode [ 265.959507] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.966971] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.974335] device bridge_slave_1 entered promiscuous mode [ 266.023002] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 266.029372] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.055350] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 266.067816] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 266.074170] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.086203] IPVS: ftp: loaded support on port[0] = 21 [ 266.099421] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 266.138919] chnl_net:caif_netlink_parms(): no params data found [ 266.152425] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 266.178039] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 266.199558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.211228] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 266.236346] audit: type=1400 audit(1582774738.173:38): avc: denied { create } for pid=8038 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 266.261332] audit: type=1400 audit(1582774738.173:39): avc: denied { write } for pid=8038 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 266.285513] audit: type=1400 audit(1582774738.173:40): avc: denied { read } for pid=8038 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 266.345004] device hsr_slave_0 entered promiscuous mode [ 266.362850] device hsr_slave_1 entered promiscuous mode [ 266.445606] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 266.470830] chnl_net:caif_netlink_parms(): no params data found [ 266.481162] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 266.497691] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 266.505429] team0: Port device team_slave_0 added [ 266.535823] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 266.545118] team0: Port device team_slave_1 added [ 266.603209] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 266.624469] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 266.631025] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.656776] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 266.676794] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 266.683188] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 266.709724] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 266.741672] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 266.768537] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.775162] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.782735] device bridge_slave_0 entered promiscuous mode [ 266.796181] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.867195] device hsr_slave_0 entered promiscuous mode [ 266.923044] device hsr_slave_1 entered promiscuous mode [ 266.963005] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.969410] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.976588] device bridge_slave_1 entered promiscuous mode [ 267.008070] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 267.019419] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 267.027540] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 267.035248] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.041660] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.048981] device bridge_slave_0 entered promiscuous mode [ 267.098956] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 267.105995] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.112380] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.120462] device bridge_slave_1 entered promiscuous mode [ 267.147569] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 267.155060] team0: Port device team_slave_0 added [ 267.191870] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 267.201035] team0: Port device team_slave_1 added [ 267.215476] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 267.225698] chnl_net:caif_netlink_parms(): no params data found [ 267.258940] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 267.289767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 267.297550] team0: Port device team_slave_0 added [ 267.309602] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 267.316288] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.341639] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 267.353693] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 267.359980] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.386099] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 267.404161] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 267.411856] team0: Port device team_slave_1 added [ 267.425053] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 267.471685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 267.487389] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 267.497458] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.524761] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 267.536955] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 267.543298] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.568570] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 267.579685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 267.591272] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 267.646181] device hsr_slave_0 entered promiscuous mode [ 267.683051] device hsr_slave_1 entered promiscuous mode [ 267.725123] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 267.737681] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 267.767214] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 267.793622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.855392] device hsr_slave_0 entered promiscuous mode [ 267.913064] device hsr_slave_1 entered promiscuous mode [ 267.960441] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 267.973672] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 267.991267] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.998184] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.006177] device bridge_slave_0 entered promiscuous mode [ 268.016213] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.024877] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.032060] device bridge_slave_1 entered promiscuous mode [ 268.039275] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 268.076936] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 268.091746] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.109534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.117450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.135301] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 268.141403] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.153949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 268.168634] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 268.184964] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 268.193265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.201233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.209143] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.215664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.223323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.238212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 268.253243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 268.275310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.284757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.292870] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.299254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.307160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.367171] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 268.375232] team0: Port device team_slave_0 added [ 268.381627] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 268.389737] team0: Port device team_slave_1 added [ 268.408256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 268.430982] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 268.441055] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.467032] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 268.481480] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 268.487882] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.513154] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 268.531119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 268.539960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.551387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 268.563164] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.580024] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 268.592243] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.600446] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.608359] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.618493] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 268.631026] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 268.661760] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.668362] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.677206] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.684988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.692801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.746044] device hsr_slave_0 entered promiscuous mode [ 268.783102] device hsr_slave_1 entered promiscuous mode [ 268.827028] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 268.835907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 268.853607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.861692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.870517] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 268.878429] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 268.888380] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 268.910747] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.930012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.938373] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 268.945152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 268.952660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.959687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.991670] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 269.025518] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 269.031641] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.047452] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 269.058460] 8021q: adding VLAN 0 to HW filter on device bond0 [ 269.067728] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 269.078697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 269.106029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.113927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.120999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.129020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.137079] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.143469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.151054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.164757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 269.174987] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 269.181126] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.191251] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 269.202304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.210548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.218660] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.225087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.232085] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.238971] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.247313] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 269.256894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 269.266646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 269.280674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.288674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.296854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.305270] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.311657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.319412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.331639] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 269.348090] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 269.359364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.367693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.375171] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.387129] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 269.393792] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.404146] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 269.414771] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.423984] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 269.436358] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 269.446389] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 269.454019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.462045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.469900] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.476367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.484238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 269.492132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.500535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 269.508705] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.517112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.525098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.532915] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.539326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.547140] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 269.554392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.567352] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 269.590557] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 269.598319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 269.606180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.614134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.625719] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 269.639693] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 269.647836] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 269.657403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.666802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.674549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.682637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.690258] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.696754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.714191] 8021q: adding VLAN 0 to HW filter on device bond0 [ 269.723260] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 269.729347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 269.744611] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 269.756057] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 269.764693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 269.774709] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 269.794941] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 269.806216] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 269.813732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.828894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.837359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.846161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.854292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.861402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.870639] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 269.883741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 269.891257] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 269.899801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 269.908601] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.918563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 269.927120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.935438] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 269.955890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 269.966310] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 269.972423] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.981037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 269.993702] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 270.001366] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 270.011906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.026051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.034029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.043743] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 270.050666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.057717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 270.066812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.078375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 270.088878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 270.103734] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 270.112080] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 270.120908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 270.128815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.136803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 270.145363] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.153316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.160935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.174487] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 270.185133] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 270.191232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 270.207043] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 270.215944] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 270.222868] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 270.231604] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 270.242880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 270.260430] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 270.273774] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 270.281146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.289425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.297791] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.304230] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.311445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.319434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.327246] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.333683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.340616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 270.348381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.356471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.367214] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 270.384811] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 270.391987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 270.401784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.411027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.423454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 270.431311] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 270.437576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 270.449957] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 270.460001] device veth0_vlan entered promiscuous mode [ 270.470717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 270.479167] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.486691] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.494086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 270.502441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 270.510632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.518654] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 270.526968] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 270.536917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 270.552167] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 270.559508] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 270.573603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 270.594299] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 270.604211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 270.612204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 270.621821] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 270.629138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.637030] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 270.651372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.660689] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 270.669777] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 270.679747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 270.686652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.695119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.709276] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 270.723878] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 270.732109] device veth1_vlan entered promiscuous mode [ 270.741347] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 270.750478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 270.762011] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 270.769615] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 270.777173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 270.786304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.793974] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.801054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.813378] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 270.822723] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 270.834773] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 270.840838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 270.851295] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 270.857946] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.875632] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 270.883355] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 270.890056] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 270.902338] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 270.915478] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 270.928240] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 270.935944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.944052] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.951643] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.958034] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.966701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.977361] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 270.987268] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 270.999226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 271.006846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.018275] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 271.028085] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 271.042003] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 271.051038] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 271.060072] device veth0_macvtap entered promiscuous mode [ 271.071548] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 271.078716] device veth0_vlan entered promiscuous mode [ 271.085669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.092832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.099980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 271.108449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 271.116433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.124621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.132473] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.138908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.146912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 271.155043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 271.164100] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 271.174316] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 271.186526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 271.199765] device veth1_macvtap entered promiscuous mode [ 271.208378] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 271.229850] device veth1_vlan entered promiscuous mode [ 271.236645] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 271.246423] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 271.253893] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 271.261465] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 271.280055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.288211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 271.296893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 271.305421] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 271.317092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 271.328270] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 271.341437] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 271.351276] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 271.364817] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 271.374304] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 271.385410] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 271.395887] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 271.413527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.426985] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 271.434901] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 271.442008] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 271.450952] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 271.499850] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 271.511927] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 271.524407] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 271.531313] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 271.537767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.545632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.556552] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 271.568067] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 271.578658] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 271.586461] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 271.603942] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 271.614151] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 271.626609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.639335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.647779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.658991] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 271.667721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.676277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 271.683920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.691415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 271.699558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 271.708148] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.715408] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.727047] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 271.738577] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 271.746245] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 271.759441] device veth0_vlan entered promiscuous mode [ 271.766599] device veth0_macvtap entered promiscuous mode [ 271.773510] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 271.784964] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 271.795512] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 271.804861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 271.816769] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 271.826829] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 271.835374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.843346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.851112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.866571] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 271.876748] device veth1_vlan entered promiscuous mode [ 271.884843] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 271.895383] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 271.904524] device veth1_macvtap entered promiscuous mode [ 271.911173] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 271.923865] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 271.931436] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 271.939339] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 271.946917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 271.954693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.962698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.969852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.979363] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 271.999440] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 272.008681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.024089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.035516] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 272.042286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.058390] device veth0_vlan entered promiscuous mode [ 272.070311] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 272.085137] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 272.095423] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 272.104757] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 272.115886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.127170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 272.138108] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 272.147748] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 272.156500] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 272.164141] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 272.175434] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 272.183793] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.190611] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.203802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.211710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.220162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.228095] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.240210] device veth1_vlan entered promiscuous mode [ 272.251096] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 272.263255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 272.273743] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 272.280689] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 272.290326] device veth0_macvtap entered promiscuous mode [ 272.298108] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 272.310308] device veth1_macvtap entered promiscuous mode [ 272.317131] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 272.325274] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.333408] device veth0_vlan entered promiscuous mode [ 272.353105] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 272.360627] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 272.368125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 272.376308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.386861] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 272.396923] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 272.407737] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 272.414717] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 272.424851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 272.438159] device veth1_vlan entered promiscuous mode [ 272.444803] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 272.462210] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 272.470442] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 272.479231] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 272.487990] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 272.501153] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 272.514537] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 272.531367] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 272.546804] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 272.560985] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 272.570093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 272.578466] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.597061] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 272.605525] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 272.615769] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 272.626247] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 272.636022] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 272.646325] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 272.653882] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 272.663197] device veth0_macvtap entered promiscuous mode [ 272.670243] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 272.684171] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 272.691606] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 272.708253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.718396] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 272.730639] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 272.741501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 272.751342] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 272.761192] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 272.771943] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 272.779754] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 272.790519] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 272.799123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.807295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.815739] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 272.824149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 272.832130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 272.840342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.867332] device veth0_macvtap entered promiscuous mode [ 272.875767] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 272.884830] device veth1_macvtap entered promiscuous mode [ 272.891551] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 272.926172] device veth1_macvtap entered promiscuous mode [ 272.940269] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 272.962682] audit: type=1400 audit(1582774744.893:41): avc: denied { associate } for pid=8038 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 272.965985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 273.022078] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.031082] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 273.038951] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.051463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 273.071491] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 273.080844] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 273.087774] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 273.098077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 273.126641] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 273.153455] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 273.162353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.186346] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.202741] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.218636] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 03:39:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa0086dd604df80600023a00e2aebd41e8e1b8428257ba8c9ba1612dff02000000000000000000000000000181009078000000006b69c0847870958221731d374b1ffbd2ede59ddec7b701d555715dd1419849322b71b09bfdb15f6323be8fe40581c3a4796d384b15b234168dc8edee70c7f9fefc2e1781a92b9484361daaf905d4be95a094399a90c6d8c724d7aa8c0f3ccd46cfca4e39799a29be9af73b214b1fff64303d7c2004e356f36153787d16820d27e70d39735b7f93779ac5b36eade8b02d64085da40cca949ee4e5820bdd5daf044796025efa37440391c2746e700b9ac4c30001930f3346046be782dde78abc807e36d69771c8f1737ac7618fa60be874"], 0x0) [ 273.228409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.240894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.257554] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 273.271521] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 273.284294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.294664] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.304005] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.314298] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.323471] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.333233] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.344033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.354408] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.365314] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 273.372292] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 273.379427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 273.387347] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.395593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.404091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.412176] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.420238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.432277] device veth0_vlan entered promiscuous mode [ 273.444746] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.455305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.464594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.479322] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.489216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.499667] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.511595] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 273.518790] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 273.526917] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.535668] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 03:39:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f00000003c0)={&(0x7f0000000000)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0], 0x1, 0x3, 0x2, 0x3}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newlink={0x104, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0xe4, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc, 0x3, {0x81000000}}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x1, 0xcac}}]}, {0x94, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x4de, 0x159}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x5, 0xfff}}, @IFLA_VF_VLAN={0x10, 0x2, {0xfffffffb, 0xd22, 0x3}}, @IFLA_VF_MAC={0x28, 0x1, {0x80, @local}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x5, 0x8}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9, 0x6}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0xffff, 0x9042}}, @IFLA_VF_TRUST={0xc, 0x9, {0x8, 0x101}}]}, {0x24, 0x1, 0x0, 0x1, [@IFLA_VF_VLAN={0x10, 0x2, {0x1ff, 0x96f, 0x2}}, @IFLA_VF_RATE={0x10, 0x6, {0x40, 0x3f, 0x8}}]}]}]}, 0x104}}, 0x0) [ 273.543086] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.551201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.563576] device veth1_vlan entered promiscuous mode [ 273.570958] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 273.577822] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.591144] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.609701] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.619533] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.629092] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.639144] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.648296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.658477] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.669855] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 273.677224] batman_adv: batadv0: Interface activated: batadv_slave_1 03:39:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)={@rand_addr=0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) socket$inet(0x2, 0x800, 0x3) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000002c0)=""/193) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000540)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 273.708149] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 273.729633] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 273.748418] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 273.777034] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.787101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.798055] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 273.873528] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 273.904155] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 273.911694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.912399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.957878] device veth0_macvtap entered promiscuous mode [ 273.980076] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 274.016438] device veth1_macvtap entered promiscuous mode [ 274.073518] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 274.080124] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 274.085149] audit: type=1400 audit(1582774746.013:42): avc: denied { create } for pid=8204 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 274.098668] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 274.130663] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 274.170281] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready 03:39:06 executing program 0: perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffc01, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x153b849f, 0x0, 0x0, 0x40}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$packet(0x11, 0x0, 0x300) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="920200007d000000057302000000000005f600000000000000000000000000000000000000000000000200000000000000003401046e6f64657673656c667701a69e85088c0e6d646373756d5b76626f786e657446707070302551918b6b95277be01386adc3817f558a1e41166f20b53ecd7862b2d90e5d3886b9c029934c85e9dd61e9ff360d7506cad229be064dbe40d2aa75a5718eb6e6a81b572119542062dea2a0546bc8d66a364c62f4aef4f21702bed03da3b55c0015057f1e87740b5cf5d3864b427c054ffbb1bb137448c9f7e734490dddbef0db8c94f8ec90f74c7531ed354e984a746edacae294161455c2f32848ba7e99692ae7234aecf779c02a0c565e1365b9c579ac39b66b8dfa7c40b754a2cc004edc698b3d1bafc60446d340d4ce48d190e008d00055336a0bcd29971634732f0909a9988a6ba8743145c9f2d95a997ddd9b3317eee72a14b1c7cf77f08aef5b7865a7dde0afa3f9803615b9652bd7cda1c3bd1b959b3cfc1b1e8161ed2255007002000000000000002b5dcb520b2a4fe383c52bf2e6ca96a84d54c59d613250e5f99e3abddc0feb0f90153000575f0a3decb2df5e8c0bdd11ea10abba8b005fc973b899df8ff4a6e6396b000000333a2ebd0ee37f0b006367726f08000000703128ac00f8f669fb716dcf315ec2f3df9f1b0a18f43985409ac65b94080339c08c2c3b9e1d52c36cde7b84a4f2b2b4a88e015a884bafe281ff1e72a8e25f47ec21cabff20f9c1c0dbe36f4fda27f1fadffaad5bb649a375abdab14a74f989804f49e7e078d8178d7e910279c1d282c4b682d4816b4f4002b793e4d1a6bbf6e5699f5a79f2dd0311d032dc452907ac33ecdd0cec30ec9d3eb216eda6d1aa490693baee3eb3e00000000000000000000000a0052646576c300d99bae2d4a43ce1d5391350ec748a8ac87258670e5c217c2c773", @ANYRES32=0xee00, @ANYRES32=0x0], 0x2b0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r3, &(0x7f0000000080), 0x0, 0x0) fallocate(r3, 0x20, 0x0, 0xfffffeff000) fallocate(r3, 0x0, 0x0, 0x10000101) [ 274.216187] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.246450] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 03:39:06 executing program 1: perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() syz_emit_ethernet(0x3e, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffff914db788d59ee15f79ff0101dd6960000800450000300000000000049078ac00004500000000000000000000007f00000100000000"], 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x1c, r1, 0x711, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x58, r1, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6fc}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10001}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x24008815) [ 274.302341] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.321824] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.346220] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.370082] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.397224] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.407037] hrtimer: interrupt took 45270 ns [ 274.417792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.436759] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 03:39:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x5b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b00160002000000000004140e00090002000000dc2976d153b4", 0x235}], 0x1}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) [ 274.455136] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.486011] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 274.497379] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 274.511482] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.526879] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.537523] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 274.555187] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.566041] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.575407] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.585474] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.594806] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.604699] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.614374] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.625112] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.636530] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 274.644192] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 274.654720] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 274.664359] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.672311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 274.680259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:39:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000100)='./file1\x00', 0x8000000, 0x0, 0x0, 0x12a3080, &(0x7f0000000140)=ANY=[]) r2 = socket$unix(0x1, 0x1, 0x0) r3 = dup2(r2, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r3, 0x5441, 0xa16) 03:39:06 executing program 1: perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4340100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() syz_emit_ethernet(0x3e, &(0x7f0000000100)=ANY=[@ANYBLOB="ffffffffff914db788d59ee15f79ff0101dd6960000800450000300000000000049078ac00004500000000000000000000007f00000100000000"], 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x1c, r1, 0x711, 0x0, 0x0, {0x5}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_FLAGS={0x8, 0x8, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x58, r1, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x6fc}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x10001}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x24008815) 03:39:06 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000001540)='/dev/ocfs2_control\x00', 0x100, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) socket$caif_stream(0x25, 0x1, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000, 0x40}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, r4, 0x0) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(0xffffffffffffffff, r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x10, 0x0, &(0x7f000034f000)) bind$xdp(r7, &(0x7f0000000900)={0x2c, 0xf, 0x0, 0x3c, r5}, 0x10) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000300), 0x12) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x2c040, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(r10, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) r11 = socket$xdp(0x2c, 0x3, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bind$xdp(r11, &(0x7f0000000900), 0x10) syz_open_dev$usbmon(0x0, 0x0, 0x0) [ 275.039072] audit: type=1400 audit(1582774746.973:43): avc: denied { map } for pid=8279 comm="syz-executor.0" path="/dev/nullb0" dev="devtmpfs" ino=16674 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 03:39:07 executing program 3: getpid() arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0) r1 = socket(0x5, 0x5, 0x2) sendto$inet(r1, &(0x7f00000000c0)="86020bb4e09be0ba", 0x8, 0x4008845, &(0x7f0000000100)={0x2, 0x4e24, @broadcast}, 0x10) 03:39:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0}, &(0x7f0000001640)=0xc) syz_mount_image$hfs(&(0x7f0000000300)='hfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7569643d6c2139ba3f97c3577859b8dfd9ee7fd8ffd435b6cc0f0ce1d6571c8e4f23e76531af2c6b0bca4fe0343e8a9babaecdedd5fde6aebf675849857932ac745a7fc32ec69a", @ANYRESHEX=r1, @ANYBLOB=',\x00']) [ 275.736424] hfs: unable to parse mount options [ 275.838040] hfs: unable to parse mount options 03:39:07 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e00)={@local}, &(0x7f0000000e40)=0x14) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x4) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffbffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c000000000061135000000000c1be4234beacf7560007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000001f670000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b51735140000000000000077ad289777d3045eb546fa13d6403d9c1f71f23f516dc6158a7b26b1607a040d10ccffa6765260948a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) exit(0x0) 03:39:07 executing program 3: openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x204080) open(&(0x7f0000000340)='./bus\x00', 0x412040, 0x204) sched_setaffinity(0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0xfffffffffffffec3, 0x0}, 0x4000080) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @multicast1}, @IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6, 0xe, 0x7}]}}}]}, 0x40}}, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r3, 0x125}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x10, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'nr0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x880}, 0x0) 03:39:07 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x0, 0x4]}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000240)={0x5, 0x7, 0x4, 0xe000, 0xb879, {}, {0x6, 0xc, 0x2, 0x81, 0x3, 0x7, "9514efa2"}, 0x5, 0x3, @planes=&(0x7f0000000200)={0x10001, 0x1ff, @userptr=0x8001, 0x1}, 0x20, 0x0, r5}) bind$phonet(r6, &(0x7f00000002c0)={0x23, 0x4, 0x1, 0x2}, 0x10) r7 = socket$pptp(0x18, 0x1, 0x2) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) r9 = dup2(r8, r7) ioctl$SG_GET_NUM_WAITING(r9, 0x227d, &(0x7f0000000000)) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000040)={'veth0\x00', 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0xa003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$bt_hci_HCI_FILTER(r11, 0x0, 0x2, &(0x7f00000000c0)={0x8, [0x6, 0x1], 0x84e0}, 0x10) ioctl$TCSETS(r10, 0x40045431, &(0x7f00005befdc)) r12 = syz_open_pts(r10, 0x1) write(r12, &(0x7f0000000100)="d5", 0xfffffffffffffd38) ioctl$TIOCSETD(r12, 0x5423, &(0x7f0000000080)=0x1) dup3(r12, r10, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x4402, 0x0) 03:39:07 executing program 2: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r4, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000340)={'batadv0\x00', r4}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000380)=0x0) r6 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, r5, 0x1, 0xffffffffffffffff, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x84000, 0x0) setsockopt$inet6_mtu(r7, 0x29, 0x17, &(0x7f00000001c0)=0x5, 0x4) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) recvfrom$ax25(r9, &(0x7f00000000c0)=""/69, 0x45, 0x0, &(0x7f0000000140)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@bcast, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}, 0x48) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r8) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r10, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="dbf146cb390000", @ANYRES16=r11, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x4004001}, 0x20000004) r12 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r13 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r13, 0x208200) sendfile(r0, r12, 0x0, 0x8000fffffffe) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 275.997320] audit: type=1400 audit(1582774747.933:44): avc: denied { prog_load } for pid=8340 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:08 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$read(0xb, r8, &(0x7f0000000000)=""/210, 0xd2) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r8) connect$packet(r3, &(0x7f0000000080)={0x11, 0x19, r6, 0x1, 0x5, 0x6, @local}, 0x14) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a00f980f1b8939885ccbb3c3aeead2e22c90fef072256e00e678290f5bb3b5d2fcf887ffa7f0ec00b74473a06025b5a64b0491236a3645b3cb24200b5a1c6aafda946ebf888518b9b1ad3e4a3b1caa195a69561039f6e107eafa89021a7503a9fc0b01542ab5bd2d23e04b258634bd754c9d2488ad379fadccbfda227bd28f64d155039b07fb8289bac4c437c00843118590f6daf256b5f0876a20b9c01607839eaecf5034b7d6979a3686a0feeac04a641cd5e133437fd1514c1c9bb"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r9 = socket$pptp(0x18, 0x1, 0x2) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r10, r9) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r12, 0xae60) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r13, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r13, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r13, 0xae80, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r13, &(0x7f0000000480)={0x9}) [ 276.280925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57 sclass=netlink_route_socket pig=8357 comm=syz-executor.2 [ 276.660014] libceph: connect [d::]:6789 error -101 [ 276.672037] libceph: mon0 [d::]:6789 connect error [ 276.680442] libceph: connect [d::]:6789 error -101 [ 276.690347] libceph: mon0 [d::]:6789 connect error 03:39:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x3, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000040)={0x80, 0x4}) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)) r2 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0xd, 0x0) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f00000000c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ftruncate(r3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000280)}, {&(0x7f00000007c0)="36baba33e929c1d2676e007853c734c2cc19bf36306d23bccdab7ea654ca71a96bb7f54f45f9ef12f92faa2cadff09df6f55ac55b9f65bb43ef2052617ebe96c753ae386b684cc1eca0c1f8e18155aa67946a7e42d88c0b57a91a69bf84a22728fb5f16c0500d057c52d30da1e2c98b388b830ba305ada7627e0c2a83a1a8f38b19d2a35c4b0150376a7b6e5ce804db3096e2f7cdb161142574465864a7f5dcda6cce29cd6752ae0fffe2baf5e01ee2ae8f58c7943647acad9db979311c943436f63056f74849316557eb31924debd481b447dc003b77e178a5051c8fe9347", 0xdf}, {&(0x7f00000001c0)="d008e126fb579f03680c819872b31161cdc9ef2c87bda2cd17ec50c1c6e051fe4790f69e9f55b3785c398f", 0x2b}, {&(0x7f0000000500)="936c6547ffdf279918cf59dfcf244c64f3aee1a77fe94d72d7685013f2fe28c6c2cbb79d7e15fd1f99bd9ab5fca980381cbc8deb3432498d1bf618f6df226fd6b39cdd225a1a2872bf933c4f1256695915fa31f69d5ce9d7b03ccdf322c75abb218f3c07717fdba99714f84de53df21229c8975b856750d4a5c15eb1efc73ca9ea9f41f0c4680262b6fb84595bad26776ee8bac68fe3770ae5cd74bb2054cf0965625f4f412a8a97594d5f991334aa706cb8a5e66762111780aca4427f76345073", 0xc1}, {&(0x7f0000000600)="37d16ce6c7f36923bfb8d71748a2162253d2b0e6746f4a0567d8966379b06260244178e94cd2662b1e54c73848d20a781eb52a3c0da4eb49272f94fc9955feb2a7e32a3906546e584cf6b4e6dc4d9265936f1972d8474385aac0b7225ffefde112b9ff581de76b8ad2b1c189fb0ec2b6c2fc08d73f9c62da92a0aa25d55f52e2250730ab1c334a8fcda801a5916ecfc64c1bec90e0c00c8f1646193673d5316264c018b6832fe222be9371c57217df81016092d4d94241a54cef1d6167d6", 0xbe}, {&(0x7f0000000440)}, {&(0x7f00000006c0)="d938a40c6be186781ef2396415082ad9f59484c4a63d305b4c39d54e2177e77882c42d0c7faf2dd54b4edc98800317a438fd136a72045f9ec472363af932b8ba6e92370a3ed02b5a0d951d1287a3c329104219f20c934d3006df070d109e5c85f3ec234465d3eac9d7b2e24ab9aba55689b29c5881fc241def4881c55de3", 0x7e}], 0x7) 03:39:08 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000500)={0x6, &(0x7f00000004c0)=[{0x42e0, 0x18, 0x3, 0x9}, {0x9, 0x2, 0x80}, {0x3, 0x1, 0x61, 0x3}, {0x8, 0x9, 0x1, 0xffff}, {0x401, 0x55, 0x7f, 0x1}, {0x80, 0x9, 0xc0, 0x1ff}]}) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) capget(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) sendto$inet(r2, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000240)='bond_slave_0\x00', 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="ddb691ab12d5d8338d8f352fbda0bb465516d61872d66871572e5e6231c0cb3cede1fbff55dd6afd42e9d04593601b94ba87ce77f7f6ca3600"/72, @ANYRES32=r8, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000b2000000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYRESOCT=r2, @ANYRES32=r8, @ANYBLOB="ffffffe2ffffff00630000000008000200000000000000004000000011f47b3da7566427d9e3e614f9f1cd1819bc43f05c61fc2feca5bf885ff2abda9fcfdeb69ac621fbaf0d10d20003b838860721188b298156e7ac638d7ddcdbe45def51e432e50bc7bfebd506c74956d889b0d108229440557b56b96346fe6d6a088a544adb774e6f845017cbbec46d7d9f0d4213b22ffc4dd04ebb3a9bfacadd1caeb70b15f972955c69b56f91c207f2dac6de"], 0x3}}, 0x20000000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {0x0, 0xffff}, {}, {0x4}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x4, 0x3}}]}, 0x34}}, 0x0) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) setxattr$security_selinux(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000480)='/sbin/dhclient\x00', 0xf, 0x1) sendfile(r2, r3, 0x0, 0x102000004) [ 276.826657] syz-executor.0 (8281) used greatest stack depth: 21888 bytes left [ 276.993482] libceph: connect [d::]:6789 error -101 [ 276.998557] libceph: mon0 [d::]:6789 connect error [ 277.036858] IPv6: ADDRCONF(NETDEV_UP): bridge1: link is not ready 03:39:09 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) madvise(&(0x7f000005b000/0x400000)=nil, 0x400000, 0x13) mbind(&(0x7f0000113000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x70, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000200)={r4, 0xfff, 0x1f}, 0x8) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r6, 0x10, 0x0, @in6={0xa, 0x4e24, 0x7fffffff, @remote, 0x3}}}, 0x90) syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xa6, 0x100) 03:39:09 executing program 2: perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) r1 = socket$l2tp6(0xa, 0x2, 0x73) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r4, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000340)={'batadv0\x00', r4}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000380)=0x0) r6 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, r5, 0x1, 0xffffffffffffffff, 0x0) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x84000, 0x0) setsockopt$inet6_mtu(r7, 0x29, 0x17, &(0x7f00000001c0)=0x5, 0x4) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) recvfrom$ax25(r9, &(0x7f00000000c0)=""/69, 0x45, 0x0, &(0x7f0000000140)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@bcast, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}, 0x48) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r8) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r10, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="dbf146cb390000", @ANYRES16=r11, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x4004001}, 0x20000004) r12 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) r13 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r13, 0x208200) sendfile(r0, r12, 0x0, 0x8000fffffffe) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:39:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000280)="b200eb88f9cc024d7b8296442d12c0b17863c5d5adf9b4b35a00fb4921a7fc3bdcb84150860fb5aa7d57e2500e4075eaa59aa83d666d5152cd482e6ed83329c5db0f5e45e498157d67c233524f28ea9718a9741c3bfaadaa09fffe45b8954ad3ff329e9429e2ae29870888c125c0860658b17136546044ebdc9776f5fa4ac20693f975fdbc6069fa42") ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0xa, 0x1, 0x61, 0x3}, {0x32d, 0x8, 0x6, 0x1000}, {0x4, 0xff, 0x7f, 0x8}, {0x8, 0xf7, 0x4, 0x10001}]}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="500000001000210400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002800128008000100677470001c00028008000100", @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="524940d32de2f97b54704b"], 0x50}}, 0x0) 03:39:09 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x0, 0x4]}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000240)={0x5, 0x7, 0x4, 0xe000, 0xb879, {}, {0x6, 0xc, 0x2, 0x81, 0x3, 0x7, "9514efa2"}, 0x5, 0x3, @planes=&(0x7f0000000200)={0x10001, 0x1ff, @userptr=0x8001, 0x1}, 0x20, 0x0, r5}) bind$phonet(r6, &(0x7f00000002c0)={0x23, 0x4, 0x1, 0x2}, 0x10) r7 = socket$pptp(0x18, 0x1, 0x2) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) r9 = dup2(r8, r7) ioctl$SG_GET_NUM_WAITING(r9, 0x227d, &(0x7f0000000000)) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000000040)={'veth0\x00', 0x200}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0xa003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$bt_hci_HCI_FILTER(r11, 0x0, 0x2, &(0x7f00000000c0)={0x8, [0x6, 0x1], 0x84e0}, 0x10) ioctl$TCSETS(r10, 0x40045431, &(0x7f00005befdc)) r12 = syz_open_pts(r10, 0x1) write(r12, &(0x7f0000000100)="d5", 0xfffffffffffffd38) ioctl$TIOCSETD(r12, 0x5423, &(0x7f0000000080)=0x1) dup3(r12, r10, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x4402, 0x0) [ 277.453982] ceph: No mds server is up or the cluster is laggy [ 277.489224] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57 sclass=netlink_route_socket pig=8411 comm=syz-executor.2 03:39:09 executing program 0: syz_emit_ethernet(0x46, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffffa0d35b1004bb0800450000380000000000019078ac1e0001ac1414aa05009078000000004500000000000000000600167f000001ac1414aa00006371ae9b1c01"], 0x0) [ 277.717210] ceph: No mds server is up or the cluster is laggy 03:39:09 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$read(0xb, r8, &(0x7f0000000000)=""/210, 0xd2) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r8) connect$packet(r3, &(0x7f0000000080)={0x11, 0x19, r6, 0x1, 0x5, 0x6, @local}, 0x14) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a00f980f1b8939885ccbb3c3aeead2e22c90fef072256e00e678290f5bb3b5d2fcf887ffa7f0ec00b74473a06025b5a64b0491236a3645b3cb24200b5a1c6aafda946ebf888518b9b1ad3e4a3b1caa195a69561039f6e107eafa89021a7503a9fc0b01542ab5bd2d23e04b258634bd754c9d2488ad379fadccbfda227bd28f64d155039b07fb8289bac4c437c00843118590f6daf256b5f0876a20b9c01607839eaecf5034b7d6979a3686a0feeac04a641cd5e133437fd1514c1c9bb"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r9 = socket$pptp(0x18, 0x1, 0x2) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r10, r9) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r12, 0xae60) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r13, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r13, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r13, 0xae80, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r13, &(0x7f0000000480)={0x9}) 03:39:09 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) listen(r3, 0xfffffffe) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000008c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@aname={'aname', 0x3d, 'trans=fd,'}}], [], 0x6b}}) 03:39:10 executing program 0: bind$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$read(0xb, r8, &(0x7f0000000000)=""/210, 0xd2) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r8) connect$packet(r3, &(0x7f0000000080)={0x11, 0x19, r6, 0x1, 0x5, 0x6, @local}, 0x14) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a00f980f1b8939885ccbb3c3aeead2e22c90fef072256e00e678290f5bb3b5d2fcf887ffa7f0ec00b74473a06025b5a64b0491236a3645b3cb24200b5a1c6aafda946ebf888518b9b1ad3e4a3b1caa195a69561039f6e107eafa89021a7503a9fc0b01542ab5bd2d23e04b258634bd754c9d2488ad379fadccbfda227bd28f64d155039b07fb8289bac4c437c00843118590f6daf256b5f0876a20b9c01607839eaecf5034b7d6979a3686a0feeac04a641cd5e133437fd1514c1c9bb"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r9 = socket$pptp(0x18, 0x1, 0x2) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r10, r9) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r12, 0xae60) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r13, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r13, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r13, 0xae80, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r13, &(0x7f0000000480)={0x9}) 03:39:10 executing program 2: bind$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$read(0xb, r8, &(0x7f0000000000)=""/210, 0xd2) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r8) connect$packet(r3, &(0x7f0000000080)={0x11, 0x19, r6, 0x1, 0x5, 0x6, @local}, 0x14) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a00f980f1b8939885ccbb3c3aeead2e22c90fef072256e00e678290f5bb3b5d2fcf887ffa7f0ec00b74473a06025b5a64b0491236a3645b3cb24200b5a1c6aafda946ebf888518b9b1ad3e4a3b1caa195a69561039f6e107eafa89021a7503a9fc0b01542ab5bd2d23e04b258634bd754c9d2488ad379fadccbfda227bd28f64d155039b07fb8289bac4c437c00843118590f6daf256b5f0876a20b9c01607839eaecf5034b7d6979a3686a0feeac04a641cd5e133437fd1514c1c9bb"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r9 = socket$pptp(0x18, 0x1, 0x2) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r10, r9) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r12, 0xae60) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r13, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r13, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r13, 0xae80, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r13, &(0x7f0000000480)={0x9}) [ 278.315464] libceph: connect [d::]:6789 error -101 [ 278.320552] libceph: mon0 [d::]:6789 connect error [ 278.342096] libceph: connect [d::]:6789 error -101 [ 278.357746] libceph: mon0 [d::]:6789 connect error [ 278.435584] ceph: No mds server is up or the cluster is laggy 03:39:10 executing program 5: bind$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000001c0)="080db5055e0bcfe8697071") r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) r3 = dup3(r1, r2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r8 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, r7) keyctl$read(0xb, r8, &(0x7f0000000000)=""/210, 0xd2) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, r8) connect$packet(r3, &(0x7f0000000080)={0x11, 0x19, r6, 0x1, 0x5, 0x6, @local}, 0x14) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a00f980f1b8939885ccbb3c3aeead2e22c90fef072256e00e678290f5bb3b5d2fcf887ffa7f0ec00b74473a06025b5a64b0491236a3645b3cb24200b5a1c6aafda946ebf888518b9b1ad3e4a3b1caa195a69561039f6e107eafa89021a7503a9fc0b01542ab5bd2d23e04b258634bd754c9d2488ad379fadccbfda227bd28f64d155039b07fb8289bac4c437c00843118590f6daf256b5f0876a20b9c01607839eaecf5034b7d6979a3686a0feeac04a641cd5e133437fd1514c1c9bb"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) r9 = socket$pptp(0x18, 0x1, 0x2) r10 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r10, r9) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r12, 0xae60) r13 = ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r13, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r13, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r13, 0xae80, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r13, &(0x7f0000000480)={0x9}) [ 278.721558] libceph: connect [d::]:6789 error -101 [ 278.729056] libceph: mon0 [d::]:6789 connect error [ 278.740667] libceph: connect [d::]:6789 error -101 [ 278.752776] libceph: mon0 [d::]:6789 connect error [ 278.813139] ceph: No mds server is up or the cluster is laggy 03:39:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) prctl$PR_SET_SECUREBITS(0x1c, 0x8) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$tun(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="030000000000000000004500002400010000002190ac1414aa000000000401907800f426e6003237fbdc2656756cd21e9687e0c008f1de0f0f26693ac757d5209efab9e62d8186d57a98e101f123341a17473ad843fce77ef77e3a6a23ff4cf3a200578f569c9302ca10d4936f8b967e5021913cf1238997cc7fb6d7d5fbd67c688a869ad5dac0bf1023ddf9aeabd5b4dbd4097667d8d9ff11abe304006cc88087d4a1f7fbbfb98f113cef2a8ff95c9ef3071f5f03e1ee938469f692fe6ad1430b478fe472075f8bc96981bb2f58010000000000", @ANYRESOCT=r5, @ANYBLOB="1d592aeb121d103d83a2e5a4af17eda26f", @ANYRESOCT, @ANYBLOB="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"], 0x5) [ 278.999704] ceph: No mds server is up or the cluster is laggy 03:39:11 executing program 1: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000440)={0x1, 0x0, 0xffffffff, 0x3ff, &(0x7f00000002c0)}) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) fcntl$getown(r2, 0x9) openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r4, 0x400000001ffffffd) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r9, 0x125}, 0x14}}, 0x0) r10 = socket(0x10, 0x803, 0x0) r11 = socket(0x1, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x8) sendmsg$nl_route(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r12}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f00000003c0)={0x4, 0x7, {0x3, 0x101, 0x4f, {0x9, 0x4}, {0xfff, 0x8}, @period={0x5a, 0x4, 0x4, 0x6, 0x100, {0xff, 0xfffa, 0x9}, 0x1, &(0x7f0000000280)=[0xff81]}}, {0x54, 0x1, 0x1, {0x4, 0x200}, {0xffe, 0x8}, @ramp={0xffff, 0x1f, {0x7ff, 0x0, 0x8, 0x7f}}}}) sendmsg$NL80211_CMD_START_SCHED_SCAN(r7, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r9, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x9675}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x40}]}, 0x30}}, 0x20048020) socket$kcm(0xa, 0x3, 0x3a) r13 = open$dir(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r13, 0x40086602, &(0x7f0000000040)=0x8032) 03:39:11 executing program 0: open(0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x23, 0x1, 0x8, 0x1002, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r1, 0x4008550c, &(0x7f0000000000)) ptrace$getsig(0x2, r0, 0x0, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x0, @thr={&(0x7f0000000340)="28f8ab2eec9c5d3b30ac46460bc6d04e88a353d327da3359282e62c4444226d6656b8deb5fe9dbd9bf6fc766a94e692bdae0fcd9e35ed7bc90c3a98365d256cba64827601703407192f49e2518ae4b4fea9e1d72d8d46dda7efb9f4ba67e25ac213754cea438990413ea9eb07e59e1da4e0e1598ad9405cb37ead2bced7d0e381f58c44664455c77647dec75fb1b9c52e7f8c94965d1207d04c68403bf8f05ce4f21adf299fa6bdf9b0f9900b788ff1f25839a824bcf1a50b8a5419a18f8d2162b68347b992896433162011b0be1993b7992a1", &(0x7f0000000440)="b7c3becd4d304e21bed6eaa9eb2d2e5f8501e8f3c694be76a762e73bd47005c65c850399a3e77667c4f9a6eb3728ec83b104679e1c02ea9252a8c297079d0bdd95e0af91fcdaa33c27cfa168561b1d4b551e15f6c7150f152b3cc4258a1be477b197542c7fdfca078382972e07d89a13cf813d98436c0219380f25e9a483424abb20b2d4f7823a55237b43bfdfbd5ecb65422a83ee01e3b0b3e4b712dd21cf995db585db3c1c529a3bb95ced5b5117a88304e241151e485e3ce7e4393ffd12a3585474"}}, &(0x7f0000000040)) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, 0x0) open(0x0, 0x0, 0x0) creat(0x0, 0x0) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r3, 0x10, 0x8003, 0x8020001) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0xe, 0x0, 0x0, 0xf00000000000000}) [ 279.209096] audit: type=1400 audit(1582774751.143:45): avc: denied { name_bind } for pid=8477 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 279.275788] audit: type=1400 audit(1582774751.143:46): avc: denied { node_bind } for pid=8477 comm="syz-executor.1" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 279.357844] audit: type=1400 audit(1582774751.143:47): avc: denied { name_connect } for pid=8477 comm="syz-executor.1" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 279.432279] audit: type=1400 audit(1582774751.233:48): avc: denied { wake_alarm } for pid=8479 comm="syz-executor.0" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 279.485593] ceph: No mds server is up or the cluster is laggy 03:39:11 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe67}}}, 0x90) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_PCM_IOCTL_XRUN(r3, 0x4148, 0x0) [ 279.516151] audit: type=1804 audit(1582774751.363:49): pid=8483 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir722999696/syzkaller.4ejVmz/6/bus" dev="sda1" ino=16549 res=1 03:39:11 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2ceb3504df6ead74ed8a60ab563e98b592a3d27a7082dbb78ab0200ba3da8b7f56445ab100621d6234555c08dc5404738f10004fd1b3786cd89e9b08e3f5972fe9ca1e86323e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d000000000000000000000083e37f932a6b342390e27b62767e1dd5abdba8afe51cf610691e711b8e34b1cd3e381a3acaecbbbe3aef8276ad68f0ba06d89dbb3b8ed6"], 0x15) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) bind$rose(r2, &(0x7f0000000200)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0x1c) r3 = dup(r1) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=']) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r6, 0x4010ae74, &(0x7f0000000180)={0x8001, 0x7, 0xffff}) [ 279.989884] overlayfs: statfs failed on './file0' [ 280.041702] overlayfs: statfs failed on './file0' 03:39:12 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) io_setup(0x7, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r2, 0x82, &(0x7f0000000540)=[&(0x7f00000000c0)={0xc, 0x1fe0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 03:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="500000000001010400000000000000000a0000003c0001802c00018014000300fe8000000014000400a5ce7f82d74be28f361614d669590a150c000280050001003a00"/80], 0x50}}, 0x0) dup(r1) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="600000000001010400000000000000000a0000004c00068008000100000001ff08000100ffffffff08000200e000000114000380060001004e210000060001004e23000008000100e000000104000380080002007f0000010800021fcc00ffff"], 0x60}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_emit_ethernet(0xb6, &(0x7f0000000440)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x80, 0x3a, 0xff, @local={0xfe, 0x80, [0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x11, "84f0da52ef2457131396805037f55924f4dffba7"}]}}}}}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresuid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getresuid(0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0x2, 0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x50, 0x0, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr="a5ce7f82d74be28f361614d669590a15"}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}]}, 0x50}}, 0x0) fsetxattr$system_posix_acl(r3, 0x0, 0x0, 0xfffffffffffffe75, 0x0) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) restart_syscall() dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) 03:39:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendfile(r0, r1, &(0x7f0000000300)=0x7fffffff, 0xfff) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x138, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x70, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9f}]}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x83}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xd7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xdfcf}]}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}]}]}, 0x138}}, 0x0) dup(0xffffffffffffffff) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f00000002c0)=0x501) [ 280.221481] audit: type=1400 audit(1582774752.143:50): avc: denied { create } for pid=8502 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 280.346412] audit: type=1400 audit(1582774752.273:51): avc: denied { write } for pid=8502 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 280.361554] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 03:39:12 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) capget(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xb}, 0x0, 0x0, 0x1}, 0x0, 0xe, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r1, &(0x7f00000067c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, &(0x7f0000002200)=[{&(0x7f0000000080)='G', 0x1}], 0x1}}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x0, @loopback}}}, &(0x7f0000000140)=0x98) [ 280.416998] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:39:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) connect$bt_sco(r1, &(0x7f0000000000), 0x8) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000580)="5500000018007f6800fe05b2a4a280930a060001fe80000214000000390009002d0050000600000019000540029b84136ef75afb83de441100ae20ca3ab8220000060cec4fab91d471cd34938c42f030dd941e7931", 0x55}], 0x1}, 0x4040) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) accept4$rose(r2, 0x0, &(0x7f0000000040), 0x80800) 03:39:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="500000000001010400000000000000000a0000003c0001802c00018014000300fe8000000014000400a5ce7f82d74be28f361614d669590a150c000280050001003a00"/80], 0x50}}, 0x0) dup(r1) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="600000000001010400000000000000000a0000004c00068008000100000001ff08000100ffffffff08000200e000000114000380060001004e210000060001004e23000008000100e000000104000380080002007f0000010800021fcc00ffff"], 0x60}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_emit_ethernet(0xb6, &(0x7f0000000440)={@local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x80, 0x3a, 0xff, @local={0xfe, 0x80, [0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78ce540cd4f791153d5dea6b259fe8000000000000023493b87aa0568f00b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a81803"}, {0x0, 0x11, "84f0da52ef2457131396805037f55924f4dffba7"}]}}}}}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getresuid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getresuid(0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0x2, 0x0, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x50, 0x0, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev}, {0x14, 0x4, @rand_addr="a5ce7f82d74be28f361614d669590a15"}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}]}, 0x50}}, 0x0) fsetxattr$system_posix_acl(r3, 0x0, 0x0, 0xfffffffffffffe75, 0x0) openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) restart_syscall() dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x800000000004e20, 0x0, @loopback}, 0x1c) [ 280.642300] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 280.649114] IPv6: NLM_F_CREATE should be set when creating new route [ 280.655834] IPv6: NLM_F_CREATE should be set when creating new route [ 280.656509] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 280.685439] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 03:39:12 executing program 0: write(0xffffffffffffffff, &(0x7f0000000100)="2400000052001f0014f9f407000904000a00071008000100ffffffff368fb830f3c70719", 0x24) [ 280.720449] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 03:39:12 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) close(r0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0x400, 0x56f}) sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa13, 0x80}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$bt_sco(r1, &(0x7f0000000080)={0x1f, @none}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/nf_conntrack\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000640)=""/4093, 0xffd}], 0x1, 0x0) 03:39:12 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3e, 0x80400) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x7, 0xfffffffd, 0x2, 0x4, 0x3, "7804bf15dd828c7c2f9404cc364e4738383a97"}) r1 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r3 = dup2(r1, r2) vmsplice(r3, &(0x7f0000000280)=[{&(0x7f0000000100)="7f807e62c27e2a1ac70b8ae755bc8a080434199d42a51c467ac1abdb3898ea971140d24a675798ca55f62b31e84a846474aa22c398030ad0cdb83f3ff34fb383b9a9c21471683fdd8430fe010fbb588613c4d3eed1e242619cf8c2a6140186acd88b4bc9f552fad514603386596a08415d5fa765e96735a43f7a0e5384e61b55c2ecc36240ade6b1338b9dc2a763acc8bc8de3626ca434e73610328a92b9ea315f0f449a83b0aaf339d9f7b1f60402d1b1c19181f81608efdd9b27743ea98ecfcef487c1e6f83f3c66673071ed0126c5", 0xd0}, {&(0x7f0000000200)="22314bc2ef7fb3f11fd0f2e88e327dbaf5f86573100abbebbaa367c5c1e1da8eb074a670ea004b9bf2bce68f167140c693c0b224920cdd39792326eb03eb0d40c65a86", 0x43}], 0x2, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000080)={0xffffffff, "25e306003b00d5934f544c0000008e2500", 0x20, 0x2001, 0x653, 0x4, 0x4}) getgroups(0x1b, 0xffffffffffffffff) 03:39:12 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in6={{0x2, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x2, 0x34}, 0x9c) 03:39:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x2) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) fallocate(0xffffffffffffffff, 0x10, 0x8003, 0x8020001) open(&(0x7f00000000c0)='./file1\x00', 0x141042, 0x0) socket$unix(0x1, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000100)={0x29}, 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(0x0, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280), 0x1033b) fdatasync(r1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) r2 = creat(0x0, 0x0) fdatasync(r2) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r3, 0x10, 0x8003, 0x8020001) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0xe, 0x0, 0x0, 0xf00000000000000}) creat(&(0x7f0000000300)='./file0\x00', 0x0) 03:39:12 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000000)={0x4, 0xffffffffffffffff, 0x1}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, 0x0) r5 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r5, 0x84, 0x6c, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000280)=0x90) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r6, 0x5}, 0x8) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000600)={'syz0\x00', {0x7}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd58c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x912, 0x0, 0x0, 0x0, 0x0, 0x90000000, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401]}, 0x45c) r7 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000003880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r8, 0x890d, &(0x7f00000038c0)={0x0, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x20, 0x0, 0x0, 0x0, 0xfe71, 0x0, 0x1, 0x10000, 0xf000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 03:39:13 executing program 0: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_OPERSTATE={0x5, 0x10, 0x80}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x38}}, 0x0) [ 281.092234] audit: type=1804 audit(1582774753.023:52): pid=8540 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir722999696/syzkaller.4ejVmz/9/bus" dev="sda1" ino=16521 res=1 [ 281.238316] audit: type=1804 audit(1582774753.073:53): pid=8544 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir722999696/syzkaller.4ejVmz/9/bus" dev="sda1" ino=16521 res=1 [ 281.311205] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:39:13 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getsig(0x2, r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x400000cf44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x2, 0x5}, 0x800, 0x0, 0xffffffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fsetxattr$trusted_overlay_redirect(r1, 0x0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) r2 = socket$nl_crypto(0x10, 0x3, 0x15) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x5, 0x8, 0x9, 0x0, 0x40, 0x20120, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040), 0x9}, 0x108, 0x7ff, 0x200, 0x1, 0xff, 0x8b, 0xff}, r3, 0x10, 0xffffffffffffffff, 0x0) bind$netlink(r2, &(0x7f0000001c00)={0x10, 0x0, 0x0, 0x20000}, 0xc) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r5 = socket(0x10, 0x80002, 0x0) sendfile(r5, r4, 0x0, 0xf0d) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="4e000000060000000000003407046a"], 0x15) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 281.357635] audit: type=1400 audit(1582774753.133:54): avc: denied { map } for pid=8545 comm="syz-executor.2" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=31668 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 281.376900] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 03:39:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008002, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x20000, 0x0) sendto$inet(r1, &(0x7f0000000140)="e4699be99475a9da1c13363cb075a43446ef938cc5bf5a5c731da71e4be222f402ed8e9d2a1eacac8ae30f7870bf9437fb1462306ad1fab2a854788a083259885cd0977c9c52b8883af790263bc3010a7ad98e3b1c40ee7ee3d191e2753e3ec4fb3f70056d665fb41a4571db3713a53a8a730cc1c124d7a2c2d734a71ae358c9ce6e82ba9819ef0bb8f24c3679a5f4d64ac3655796aaccc7fab71a79a4938ef75b1a916fd26c66c1be53af7a9381f374af1a19c6ce487b5e26bee5b201ab7f9207452be735a5c24d18226eeefbae14a55f1dfe7618dd79291390663a633c9a46f72130e9", 0xe4, 0x44080, &(0x7f0000000240)={0x2, 0x4e21, @broadcast}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x120, 0x0, 0x4f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 281.513070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8224 sclass=netlink_route_socket pig=8559 comm=syz-executor.5 [ 281.577678] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pig=8559 comm=syz-executor.5 [ 281.630522] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 281.685311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8224 sclass=netlink_route_socket pig=8559 comm=syz-executor.5 [ 281.752258] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pig=8559 comm=syz-executor.5 03:39:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="580000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="abba0100000000002800128008000100767469001c00028008000400a9feffff08000500e000000208000100", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0800040000009e7e19c946c521de66ecb3956e07e1ffffffb1cc00000000"], 0x58}}, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r3, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x100, r4, 0x4, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xf009}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffff8}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_NET={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x70, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x71be}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffff7}]}, @TIPC_NLA_NODE={0x34, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x48010}, 0x1) 03:39:13 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x6, 0x200100) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000280)={0x4, 0x6}) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x400000) ioctl$SIOCPNADDRESOURCE(r0, 0x89e0, &(0x7f00000006c0)=0x80000001) r2 = syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000007c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB='\x00', @ANYRES16=r2, @ANYBLOB="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"], 0x224}, 0x1, 0x0, 0x0, 0x84}, 0x24000000) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="04030000", @ANYRES16=r2, @ANYBLOB="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"], 0x304}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x4100, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000480)=0xc) r8 = socket$pptp(0x18, 0x1, 0x2) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r9, r8) statx(r9, &(0x7f00000004c0)='./file0\x00', 0x2000, 0x2, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='fuse\x00', 0x200020, &(0x7f0000000840)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x1ff}}, {@appraise='appraise'}, {@euid_gt={'euid>', r10}}]}}) mount(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000600)='ramfs\x00', 0x0, 0x0) r11 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) close(r3) r12 = openat$cgroup_subtree(r11, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000980)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r12}}) 03:39:13 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000940)={@remote, 0x0}, &(0x7f0000000980)=0x14) bind$packet(r0, &(0x7f00000009c0)={0x11, 0x5, r1, 0x1, 0x9, 0x6, @multicast}, 0x14) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000080)=0xf0000000, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x70, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000001c0)={0x8000, 0x0, 0x4, 0x2, 0x3, 0x2, 0x3, 0x0, r7}, &(0x7f0000000240)=0x20) r8 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup2(r9, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="ffec09ceff9ae4f8eea04a7456"], 0x9) close(r8) socket$netlink(0x10, 0x3, 0x4) bind(0xffffffffffffffff, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r8, 0x0, 0x80000001, 0x0) 03:39:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = socket$pptp(0x18, 0x1, 0x2) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r5, r4) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f0000000180)={0x0, 0x3ff, 0x15, &(0x7f0000000100)=0x1}) r6 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r6, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r6, 0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r6, 0x84, 0x6d, &(0x7f00000000c0)={r7, 0x1, "cb"}, &(0x7f0000000000)=0xff19) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)=ANY=[@ANYRES32=r7, @ANYBLOB="191498274e790000004982ab4a025adb1d20"], &(0x7f0000000080)=0x21) write(r3, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 282.076474] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8588 comm=syz-executor.1 [ 282.113026] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8588 comm=syz-executor.1 [ 282.152818] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8588 comm=syz-executor.1 [ 282.180411] 9pnet: Insufficient options for proto=fd [ 282.183713] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8588 comm=syz-executor.1 [ 282.228190] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8588 comm=syz-executor.1 03:39:14 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f00000000c0)=0x8) getdents(r0, &(0x7f00000006c0)=""/4096, 0x1000) [ 282.269431] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=8588 comm=syz-executor.1 03:39:14 executing program 0: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 03:39:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200382, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x1}) 03:39:14 executing program 0: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 03:39:14 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10000, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000500)={0x0, 0xffffffffffffff30, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYRES64=r1, @ANYPTR64=&(0x7f0000000040)=ANY=[], @ANYBLOB="01010000000000000000010000000000960000000c0006006c626c637200000008000b000a69700008000800000700000000090000000080080001000a0000000800050002000000"], 0x3}, 0x1, 0x0, 0x0, 0x40}, 0x0) 03:39:14 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000100)=0xc) pipe(&(0x7f0000000080)={0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000000000)) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000006c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000007c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000740)={&(0x7f0000000240)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000027bf7025050000000c00050000000000000000000c000400ff01000000000000000000001cf9b69ca7e2156d4564329758c1e73965460f7ef4c96845b9dd9168e212737dbecbd1ee11eef7b9c2a311010b035d88de4819b1b2232587e7f5aa9e993bfaef09"], 0x2c}}, 0x4000000) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="200029bd7000fedbdf25050000000c00040000000000000000000c00030002000000000000000c00060001000000000000000c00040000000100000000000c0005000e010000000000000c0005000001000000000000efdf4304000000000000d39b9392f8dc241a276dbe7ac00017bbe701fd3344b35ed5144d2e2e4b"], 0x5c}, 0x1, 0x0, 0x0, 0x24000005}, 0x4000) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockname$netrom(r6, &(0x7f00000002c0)={{0x3, @bcast}, [@rose, @netrom, @default, @remote, @bcast, @remote, @rose, @default]}, &(0x7f0000000140)=0x48) r7 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$nfc_llcp_NFC_LLCP_RW(r7, 0x118, 0x0, &(0x7f0000000000)=0x9, 0x4) ioctl$VIDIOC_S_INPUT(r7, 0xc0045627, &(0x7f0000000040)=0x1f) 03:39:15 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) r2 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r4 = dup2(r2, r3) r5 = socket$pptp(0x18, 0x1, 0x2) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r6, r5) ioctl$RNDCLEARPOOL(r6, 0x5206, &(0x7f0000000080)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff10, 0x9148e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8b2b1d361c1f415d}, 0x0, 0x6, r4, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r7 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x20000) r8 = socket(0xa, 0x1, 0x0) ioctl$BLKIOOPT(r7, 0x1279, &(0x7f0000000280)) close(r8) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x3}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r8, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f00000000c0)={r10, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, &(0x7f0000000040)=0x84) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f00000001c0)=0x7f, &(0x7f0000000200)=0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000014000/0x18000)=nil, 0x0, 0x0, 0x18, 0x0, 0x0) 03:39:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x1}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) open$dir(0x0, 0x8000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') mq_open(&(0x7f0000000000)='{system\x00', 0x1, 0x386, &(0x7f0000000080)={0x3, 0x8c9e, 0x3f, 0x1}) connect$phonet_pipe(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000080000000) socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), 0x0) 03:39:15 executing program 1: setrlimit(0x7, &(0x7f0000001580)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=ANY=[@ANYBLOB="1800000000000000000000000000000061120000000000006c00000000000000"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x1, 0x80, 0xd25}}, 0x28) 03:39:15 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) socket$caif_stream(0x25, 0x1, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000, 0x40}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(0xffffffffffffffff, r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x10, 0x0, &(0x7f000034f000)) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001400b59500000000000000000a000000", @ANYRES32=r7, @ANYBLOB="080008001f536b8e1400020000000000000000000000ffff00000000"], 0x34}}, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f0000000900)={0x2c, 0x1, r7, 0x10003c, r4}, 0x10) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000300), 0x12) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r10, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) r11 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r11, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r11, 0x11b, 0x5, &(0x7f00000004c0)=0x8000, 0x4) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r11, 0x11b, 0x6, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 03:39:15 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa10000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3b}], 0x3, 0x0, 0x0, 0x3b2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0, 0x15}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='NET_DM\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xff, 0x0, 0x0, 0x3, 0x0, 0x9], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$PNPIPE_ENCAP(r4, 0x113, 0x1, &(0x7f00000005c0), 0x4) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r5, 0x4010ae68, &(0x7f0000000380)={0x10000, 0x18000}) lsetxattr$security_capability(0x0, &(0x7f0000000140)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0x4}, {0x4}]}, 0x14, 0x1) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x60d01, 0x0) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000340)=@req3={0x0, 0x1ff, 0xf7c, 0x4, 0x81, 0x81, 0x6}, 0x1c) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nvram\x00', 0x100800, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000440), 0x4) 03:39:15 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x1004e20, @dev={0xac, 0x14, 0x14, 0x41}}, 0x10) sendto$inet(r0, &(0x7f00000015c0)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14d70409a996a1de1cf7f93a4586204c034bd8e4c941d69f646bd4ac73715023d30170e4da386060", 0x41, 0x8800, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r0, &(0x7f0000000040)="f57178c7", 0x4) recvmmsg(r0, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f0000001940)=[{0x0, 0x41}, {&(0x7f0000001d40)=""/124, 0x7c}], 0x2}}], 0x1, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xb00, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f00000000c0)={0x4, 0x103, 0x1, {0x7, 0x0, 0x8, 0x20}}) [ 283.793031] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:39:15 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps_rollup\x00') exit(0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000fc0)={0x50, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_REG_RULES={0x34, 0x22, 0x0, 0x1, [@NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x4}, @NL80211_ATTR_FREQ_RANGE_END={0x0, 0x3, 0x4}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x4}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1fe000}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x4}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x0, 0x6, 0x4}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040854}, 0x55) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000001040)={0xf000000, 0x0, 0x1f, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0x9909d2, 0x1, [], @value64=0x1f}}) ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000001080)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_REG(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14, r5, 0x125}, 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000f80)={&(0x7f0000000240), 0xc, &(0x7f0000000f40)={&(0x7f0000000280)=ANY=[@ANYBLOB="940c0000", @ANYRES16=r5, @ANYBLOB="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"], 0xc94}, 0x1, 0x0, 0x0, 0x4000}, 0xc1a4) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f00000000c0)) ptrace(0x10, r6) ptrace$getsig(0x2, r6, 0x0, 0x0) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f00000000c0)) ptrace(0x10, r7) ptrace$getsig(0x2, r7, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000012c0)={0x0, 0x0}) syz_open_procfs(r8, &(0x7f0000001280)='gid_map\x00') r9 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r10, 0xae60) ioctl$KVM_CREATE_VCPU(r10, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r10, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r10, &(0x7f0000001100)={0x2}) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000010c0)={0x3, 0x0, 0x1, 0x4, 0x1, "d34c83be4cca1d4414f5d03421e96bd29dda80"}) 03:39:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000000)=@newtaction={0x44, 0x30, 0x53b, 0x0, 0x0, {}, [{0x44, 0x1, [@m_sample={0x40, 0x1, 0x0, 0x0, {{0xb, 0x1, 'sample\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PARMS={0x18}, @TCA_SAMPLE_RATE={0x8}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8}]}, {0x4}}}]}]}, 0x58}}, 0x0) sendfile(r4, r1, 0x0, 0x100000001) 03:39:15 executing program 5: r0 = socket(0x27, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x6, 0x1}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={r1, 0x11, "ce4365eca9c65d76f90370d3f629153de0"}, &(0x7f00000001c0)=0x19) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) getsockopt$IP_SET_OP_GET_BYINDEX(r2, 0x1, 0x53, &(0x7f0000000000)={0x7, 0x7, 0xffffffffffffffff}, &(0x7f0000000040)=0x28) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="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"], 0xcc}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) perf_event_open(&(0x7f0000348f88)={0x3, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 03:39:16 executing program 5: mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="03", @ANYRESHEX]) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SPEED(r3, 0xc0045002, &(0x7f0000000080)=0x10001) ioctl$SNDCTL_DSP_SETFRAGMENT(r3, 0xc004500a, &(0x7f0000000100)) sendfile(r3, r2, 0x0, 0x1c01) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r5, 0xc004500a, &(0x7f0000000100)) sendfile(r5, r4, 0x0, 0x1c01) r6 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x841, 0x0) ioctl$SNDCTL_DSP_SPEED(r7, 0xc0045002, &(0x7f0000000080)=0x10001) ioctl$SNDCTL_DSP_SETFRAGMENT(r7, 0xc004500a, &(0x7f0000000100)) sendfile(r7, r6, 0x0, 0x1c01) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r8 = socket$inet(0xa, 0x801, 0x0) getsockopt$inet_dccp_buf(r8, 0x21, 0x0, &(0x7f0000000480)=""/4096, &(0x7f0000000140)=0x1000) socket$inet(0xa, 0x801, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') [ 284.120606] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.4'. 03:39:16 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x50200, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$VIDIOC_CROPCAP(r3, 0xc02c563a, &(0x7f0000000380)={0xc, {0x8, 0x80, 0x9e45, 0xf2}, {0x1, 0x80000001, 0x1, 0x2}, {0xfffffffe, 0x40}}) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x4103, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x2, &(0x7f00000001c0), 0x4) prctl$PR_CAPBSET_DROP(0x18, 0x5) r5 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r9, 0xae60) r10 = ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r10, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r10, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r10, 0xae80, 0x0) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r12, 0xae60) ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r12, 0x4020ae46, &(0x7f0000bf7000)={0x10201, 0x0, 0x0, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r14, 0xae60) r15 = ioctl$KVM_CREATE_VCPU(r14, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r15, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r15, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r15, 0xae80, 0x0) r16 = dup(r15) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r16, 0x40a85323, &(0x7f0000000200)={{0x81, 0x5}, 'port1\x00', 0xa0, 0x1c, 0x0, 0x1, 0x5, 0xbc, 0x8, 0x0, 0x6, 0x3f}) ioctl$TIOCGICOUNT(r7, 0x545d, 0x0) sendmsg$inet(r0, &(0x7f000000bdc0)={&(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000000)='e', 0x1}], 0x1}, 0xbef405f7554a2bc1) 03:39:16 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x5) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sched_rr_get_interval(0xffffffffffffffff, &(0x7f0000000040)) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x9, 0x400) r2 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000180)={0x1, 0x94b9, 0x7, {0x1, 0x1}, 0x2, 0x73d}) fchdir(r1) ioctl$SNDRV_PCM_IOCTL_STATUS64(r1, 0x80984120, &(0x7f0000000240)) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0xfff, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="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"], 0x3c}}, 0x0) [ 284.707483] device lo entered promiscuous mode [ 284.743388] device tunl0 entered promiscuous mode [ 284.777014] device gre0 entered promiscuous mode 03:39:16 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, r4, 0x605}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r4, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x5) ftruncate(r0, 0x1c08) r5 = open(&(0x7f0000000100)='./bus\x00', 0x400141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r11 = dup2(r9, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r11, 0x4c06, r7) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./bus\x00', 0x1f, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="ab18910c14aa31fc616be5601857eb96bebd8b6db7b182f838dce2cbcdb67650b2fbd308aaa9d3f950908e1a50539ff2634f08e899731618d323eaf0a8fbf60ce3ee45646009240aba6ca5e788cc4d2f59b9d5e3e769954772", 0x59, 0x5}, {&(0x7f00000001c0)="a42d27145113381861a2684cc0a94278ced60485c97a", 0x16, 0x20}], 0x1479e4a328211fdb, &(0x7f0000000240)=ANY=[@ANYBLOB='flush,dos1xfloppy,tots,dots,dots,dont_hash,fscontext=sysadm_u,appraise_type=imasig,pcr=00000000000000000031,\x00']) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000140)={0x30}, 0xb0b8) [ 284.809292] device gretap0 entered promiscuous mode [ 284.847309] device erspan0 entered promiscuous mode [ 284.901799] device ip_vti0 entered promiscuous mode [ 284.937917] device ip6_vti0 entered promiscuous mode [ 284.963411] device sit0 entered promiscuous mode 03:39:16 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x50a, 0xa0120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x9}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendfile(r2, r2, &(0x7f00000000c0)=0x54f, 0x8080fffffffe) [ 284.990931] device ip6tnl0 entered promiscuous mode [ 285.016524] device ip6gre0 entered promiscuous mode [ 285.071140] device syz_tun entered promiscuous mode [ 285.095784] device ip6gretap0 entered promiscuous mode [ 285.128936] device bridge0 entered promiscuous mode [ 285.163248] device vcan0 entered promiscuous mode [ 285.183845] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.201483] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.217905] device bond0 entered promiscuous mode [ 285.229281] device bond_slave_0 entered promiscuous mode [ 285.251540] device bond_slave_1 entered promiscuous mode [ 285.293452] device team0 entered promiscuous mode [ 285.309128] device team_slave_0 entered promiscuous mode [ 285.325645] device team_slave_1 entered promiscuous mode [ 285.352264] kauditd_printk_skb: 7 callbacks suppressed [ 285.352279] audit: type=1804 audit(1582774757.283:62): pid=8707 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir137328769/syzkaller.D0ohVO/13/file0/file0" dev="loop5" ino=5 res=1 [ 285.366769] device dummy0 entered promiscuous mode [ 285.399757] device nlmon0 entered promiscuous mode 03:39:17 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x50a, 0xa0120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x9}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendfile(r2, r2, &(0x7f00000000c0)=0x54f, 0x8080fffffffe) [ 285.472930] device caif0 entered promiscuous mode [ 285.478186] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 285.535890] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.622952] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 03:39:17 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x26e1, 0x0) socket$caif_stream(0x25, 0x1, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000, 0x40}, 0x20) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(0xffffffffffffffff, r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x10, 0x0, &(0x7f000034f000)) r5 = socket(0x10, 0x803, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001400b59500000000000000000a000000", @ANYRES32=r7, @ANYBLOB="080008001f536b8e1400020000000000000000000000ffff00000000"], 0x34}}, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f0000000900)={0x2c, 0x1, r7, 0x10003c, r4}, 0x10) r8 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r9 = openat$cgroup_procs(r8, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000300), 0x12) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r10, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) r11 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r11, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r11, 0x11b, 0x5, &(0x7f00000004c0)=0x8000, 0x4) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r11, 0x11b, 0x6, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 03:39:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nvram\x00', 0x10000, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4005ff) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000e4210f3b07ee40200000460000ff7f000000006c9078ac000000001414bb0d0090781000000020000000000090a8d40aceb42a50c4e62de0d0c154b33dfa9494436bf2988a7703454a06c7d675cf73d6887f5535eae9a039487ba5dfa9369e0e3dc6986bdba48ec9e47f0ba278f37d492820a225cfabeca5decd30a83fdbe215cdfef99a1e9a42882b4866d18925fca1c0213077cfb9aa10f8174c7832a728fbe8b01d042099f0c3b0f9c9f0d52e03bd74b56a829fd2539bb46a11f763c7fd5abee7e59b492beea00862adde49019369f2778988"], 0x100c) write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000000)={0x2, 0x7f}, 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r4, 0x10e, 0x5, &(0x7f0000000100)=0x1000, 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f00000000c0)={0x1, 0x8, [0x1, 0x1]}) 03:39:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r3, 0x0, 0x0}, 0x10) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$IP_VS_SO_SET_ADD(r5, 0x0, 0x482, &(0x7f0000000200)={0x29, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x4, 'nq\x00', 0xc, 0x3, 0x7b}, 0x2c) write$P9_RLERRORu(r4, &(0x7f00000001c0)={0x28, 0x7, 0x2, {{0x1b, '\'}&posix_acl_accesssecurity'}}}, 0x28) 03:39:17 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000080)=""/47) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f00000002c0)}], 0x2, &(0x7f00000004c0)=[@txtime={{0x18}}], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x50400, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r2, 0x4140, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) r4 = socket$tipc(0x1e, 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000140)={0x1, 0x3, 0x4, 0x80000, 0x5, {0x77359400}, {0x4, 0x8, 0x80, 0x1, 0x7, 0x1, "8a145767"}, 0x9, 0x2, @userptr=0xab, 0x5, 0x0, r4}) r5 = fcntl$dupfd(r1, 0x0, r1) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) prctl$PR_GET_FP_MODE(0x2e) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) accept(r9, 0x0, &(0x7f0000000240)) ioctl$KVM_RUN(r8, 0xae80, 0x0) fcntl$addseals(r8, 0x409, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="800000003804000019000300e60100006c0000a3b7f00000000000400000004039b750bf2eaf67249b2b352220f7d300efff00006e0ed75897c8a870fd43cbe888ff6eee00000000000000edca9effbf397bbc4542305fc9b09febfcfbbe6a2febe1cf23d45d75705a6d947600000000003596cb9de6aaecdb912afa", 0x7c, 0x410}], 0x2000, 0x0) 03:39:17 executing program 3: r0 = open(0x0, 0x202200, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfe, 0xfb, 0x0, 0x41c5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x9e81, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x5, 0x8e, &(0x7f0000000040)={0xffffffffffffffff}) accept4$bt_l2cap(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x800) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000600)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) dup(r3) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000080), 0x4) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r7 = socket$pptp(0x18, 0x1, 0x2) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r8, r7) ioctl$VHOST_SET_VRING_ADDR(r8, 0x4028af11, &(0x7f00000005c0)={0x1, 0x1, &(0x7f0000000200)=""/180, &(0x7f00000003c0)=""/241, &(0x7f00000004c0)=""/230, 0x2000}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) 03:39:17 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x50a, 0xa0120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x9}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendfile(r2, r2, &(0x7f00000000c0)=0x54f, 0x8080fffffffe) [ 286.019442] audit: type=1400 audit(1582774757.953:63): avc: denied { prog_run } for pid=8733 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:39:18 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x50a, 0xa0120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x9}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) sendfile(r2, r2, &(0x7f00000000c0)=0x54f, 0x8080fffffffe) 03:39:18 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000380)='tmpfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="80706f6c3d64658021b32e01e56566268b6b28c45f6661756c676c6a9e0cbd0000"]) [ 286.241306] tmpfs: Bad mount option €pol 03:39:18 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-control\x00', 0x182702, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x70, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000680)={r4, @in6={{0xa, 0x4e21, 0x6ba, @local, 0x61b}}, [0x1, 0x6, 0x2, 0x80000001, 0x6, 0x80000000, 0x9, 0x2, 0x80000001, 0x8000, 0x1f, 0x7fffffff, 0x0, 0x6, 0xeef7]}, &(0x7f0000000780)=0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000029000505d25a80648c63940d0224fc60100004400a000000053582c137153e370907018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xffffffffffffff77) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={r7}, 0xfffffffffffffff8) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x3e66a3c731638994) r9 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(0xffffffffffffffff, r9, 0x0) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000005c0)={0x1, 0x1000, {r10}, {0x0}, 0x2, 0x10000}) r12 = geteuid() mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x6, &(0x7f0000000a00)=ANY=[@ANYBLOB='xino=on,nfs_export=off,default_permissions,appraise_type=imasig,dont_hash,dont_measure,rootcontext=root,euid=', @ANYRESDEC=r8, @ANYBLOB="2c70baa767dfcb7ffa303030303030303030303030303034332c0500776e65723e13038cc2bb5368bc61be32ae18a5d7ff73d4b6ec25b45e541bd2ed892082b5e6056359fce3f065d6e6a9a71af84e839977784af9c4924856cabd3d57ff42b268f9691109e572c3052f80cd7889091e9e90f5e3f932d44a049be72b2a33de59ddeb8eee3843c57315a69a9e5d65556d42c1b9078287eafa7caf13e736755b59137236812cc25da44d7a53c22ddcd7b6a94decd22518", @ANYRESDEC=r11, @ANYBLOB=',defcontext=root,dont_appraise,fowner<', @ANYRESDEC=r12, @ANYBLOB="2c00ec6b6e99659eb7f0c0c726ca5e100d193d11727fd5e2d15ee04ec590ef50a1902a8e051989f102320c075b725e8cebab1058fb17ba26341198df9cd245ca0810d123ed34de580358b42676f5fdd575f60c106729b826b04ac8ab49abb07e58a70c534ede07febf8d99fe5c3c77106a43767dcad06805e825af823fda"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='/selinux/mls\x00', r7}, 0x30) fcntl$lock(r5, 0x6, &(0x7f00000000c0)={0x1, 0x2, 0x23c, 0x8, r13}) r14 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r15 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r15, 0x81a0ae8c, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r14, 0x40bc5311, &(0x7f0000068f50)={{}, 'port0\x00'}) [ 286.457349] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 286.478156] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 286.489223] netlink: 16630 bytes leftover after parsing attributes in process `syz-executor.3'. 03:39:18 executing program 0: open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x420001, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r3, r2) 03:39:18 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x50a, 0xa0120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x9}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) 03:39:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000080001007166710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00(\x00\'\r\x00'/20, @ANYRES32=r6, @ANYBLOB="0000000000000000000000000a7305000000000000000200"], 0x34}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x34, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x4}}]}, 0x34}}, 0x0) [ 286.589818] audit: type=1400 audit(1582774758.523:64): avc: denied { lock } for pid=8773 comm="syz-executor.3" path="socket:[33294]" dev="sockfs" ino=33294 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 286.675649] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 286.702249] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 286.713642] netlink: 16630 bytes leftover after parsing attributes in process `syz-executor.3'. [ 286.999598] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 287.008448] qfq: no options [ 287.022010] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 287.032015] qfq: no options 03:39:19 executing program 2: pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @broadcast}, &(0x7f0000000040)=0xc) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x94, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x20000003}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfffffffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x94}}, 0x0) 03:39:19 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-control\x00', 0x182702, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x70, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000680)={r4, @in6={{0xa, 0x4e21, 0x6ba, @local, 0x61b}}, [0x1, 0x6, 0x2, 0x80000001, 0x6, 0x80000000, 0x9, 0x2, 0x80000001, 0x8000, 0x1f, 0x7fffffff, 0x0, 0x6, 0xeef7]}, &(0x7f0000000780)=0x100) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000029000505d25a80648c63940d0224fc60100004400a000000053582c137153e370907018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xffffffffffffff77) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={r7}, 0xfffffffffffffff8) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x3e66a3c731638994) r9 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(0xffffffffffffffff, r9, 0x0) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000005c0)={0x1, 0x1000, {r10}, {0x0}, 0x2, 0x10000}) r12 = geteuid() mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x6, &(0x7f0000000a00)=ANY=[@ANYBLOB='xino=on,nfs_export=off,default_permissions,appraise_type=imasig,dont_hash,dont_measure,rootcontext=root,euid=', @ANYRESDEC=r8, @ANYBLOB="2c70baa767dfcb7ffa303030303030303030303030303034332c0500776e65723e13038cc2bb5368bc61be32ae18a5d7ff73d4b6ec25b45e541bd2ed892082b5e6056359fce3f065d6e6a9a71af84e839977784af9c4924856cabd3d57ff42b268f9691109e572c3052f80cd7889091e9e90f5e3f932d44a049be72b2a33de59ddeb8eee3843c57315a69a9e5d65556d42c1b9078287eafa7caf13e736755b59137236812cc25da44d7a53c22ddcd7b6a94decd22518", @ANYRESDEC=r11, @ANYBLOB=',defcontext=root,dont_appraise,fowner<', @ANYRESDEC=r12, @ANYBLOB="2c00ec6b6e99659eb7f0c0c726ca5e100d193d11727fd5e2d15ee04ec590ef50a1902a8e051989f102320c075b725e8cebab1058fb17ba26341198df9cd245ca0810d123ed34de580358b42676f5fdd575f60c106729b826b04ac8ab49abb07e58a70c534ede07febf8d99fe5c3c77106a43767dcad06805e825af823fda"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r6, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000040)='/selinux/mls\x00', r7}, 0x30) fcntl$lock(r5, 0x6, &(0x7f00000000c0)={0x1, 0x2, 0x23c, 0x8, r13}) r14 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) r15 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r15, 0x81a0ae8c, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r14, 0x40bc5311, &(0x7f0000068f50)={{}, 'port0\x00'}) 03:39:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xc, 0xffffffffffffffff, 0x3) getpid() r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="04000000", @ANYRES16=r5, @ANYBLOB="dd07000000000000000013000000"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="141c0000", @ANYRES16=r5, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, 0x0, 0x0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r6, 0x4010aeac, &(0x7f0000000140)={0x0, 0x6}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r8, r7) close(0xffffffffffffffff) r9 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r9, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r10 = socket$inet6(0xa, 0x3, 0x6) r11 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ip6_flowlabel\x00') sendfile(r10, r11, &(0x7f0000000240)=0x4b, 0x4000000000dc) r12 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r12, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) r13 = syz_open_procfs(0x0, &(0x7f0000000340)='maps\x00') connect$inet(r12, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) dup2(r13, r12) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r11, 0xc02064b2, &(0x7f0000000080)={0xfffffff7, 0x3, 0x172, 0x4d, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r13, 0xc01064b3, &(0x7f0000000180)={r14}) 03:39:19 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x2c, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_BROADCAST={0xa, 0x2, @random="721c65a68c72"}]}, 0x2c}}, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f00000000c0)={0xa, &(0x7f0000000040)=[0x1, 0x6, 0x80000000, 0x40, 0xfffffffb, 0x8, 0x4, 0xc073, 0x1d61, 0x4]}) 03:39:19 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @dev}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_emit_ethernet(0xd6, &(0x7f00000000c0)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x30, 0x4, 0x0, 0x4, 0xc8, 0x68, 0x0, 0x3, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, {[@ssrr={0x89, 0x1b, 0xb2, [@empty, @rand_addr=0x6, @local, @empty, @broadcast, @empty]}, @end, @generic={0x44, 0x6, "2b946e14"}, @ssrr={0x89, 0x7, 0xbf, [@empty]}, @timestamp={0x44, 0x20, 0xdc, 0x0, 0x3, [0x1, 0x5, 0x776, 0x7f, 0x2, 0x4, 0x5a1]}, @end, @cipso={0x86, 0x4b, 0xffffffffffffffff, [{0x5, 0x2}, {0x2, 0xe, "82391aeac05b56ad59d8e14c"}, {0x5, 0x11, "80d85ca4e0244a833a2ccf0f4ad14f"}, {0x2, 0x12, "f5d207c3bd854125c20ba597ebe6b125"}, {0x0, 0x12, "f40e6c6f3b6afb961af6b5a00b95d44e"}]}, @timestamp_prespec={0x44, 0x14, 0xdd, 0x3, 0xc, [{@rand_addr=0x66000000, 0x3}, {@multicast2, 0x3d}]}]}}, @address_reply={0x12, 0x0, 0x0, 0x7fffffff}}}}}, 0x0) 03:39:19 executing program 4: ioctl$SOUND_PCM_READ_BITS(0xffffffffffffffff, 0x80045005, &(0x7f00000000c0)) unshare(0x20000) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) acct(&(0x7f0000000280)='./file0\x00') pipe(&(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:39:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f00001ed000/0x4000)=nil, 0x4000, 0x0, 0x4012, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x35c}], 0x329, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x299, 0x0) [ 287.324937] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 287.359833] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 03:39:19 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 287.386898] netlink: 16630 bytes leftover after parsing attributes in process `syz-executor.3'. 03:39:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) mkdirat(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="4e0000000600000000000000000000000200000000000000060000000000000025000000000000007d747275737465642f275d2d21d17d657476e1f06b7365726b657972696e6763707573657400"], 0x4e) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000040)="007c84c3440e4e8cb9b83bc041d019ed8b7aaa242cdd97cc00ad6c7a0ccd20ee7a9a0d90784289edd6db8c99fafed92df5f43b", 0x33) r3 = socket$inet6(0xa, 0x40000080806, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r4, &(0x7f00000017c0), 0x3da, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r5, &(0x7f00000017c0), 0x3da, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x800, 0x80, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) statx(r1, &(0x7f0000000340)='./file0\x00', 0x4000, 0x100, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='fuseblk\x00', 0x2002, &(0x7f00000005c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r6}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x100}}, {@default_permissions='default_permissions'}], [{@obj_user={'obj_user', 0x3d, '!selinuxselinux\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x63, 0x31, 0x34, 0x30, 0x66, 0x39, 0x31], 0x2d, [0x36, 0x64, 0xd, 0x66], 0x2d, [0x30, 0x61, 0x39, 0x65], 0x2d, [0x33, 0x37, 0x36, 0x61], 0x2d, [0x39, 0x61, 0x33, 0x30, 0x32, 0x38, 0x31, 0x37]}}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_eq={'uid', 0x3d, r10}}, {@appraise='appraise'}, {@dont_measure='dont_measure'}]}}) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r3, 0x400000001ffffffd) r11 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_timedsend(r11, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r11, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r11, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x44) r12 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r12, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r13 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg(r13, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000740)=@req={0x0, &(0x7f00000007c0)={'ip6gretap0\x00', @ifru_map={0x5, 0x7fff, 0x2, 0x8, 0xb4, 0x4}}}) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) socket$netlink(0x10, 0x3, 0x12) 03:39:19 executing program 0: sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001fb2b9409b0d1b849ac00a80a5780200000200040000060001", 0x1f, 0x0, 0x0, 0x0) socket$inet6(0x10, 0x2, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendto$inet6(r0, &(0x7f0000000000)='E', 0x1, 0x0, 0x0, 0x0) 03:39:19 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f00000000c0)=0xffffffff, 0x4) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) pipe(&(0x7f0000000040)) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x3e1060, 0x0) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f0000000140)=""/146) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000200)=0x8, 0x4) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e24, @rand_addr=0x200}}, 0x24) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x8000000}], 0x4000000000000d0, 0x0) 03:39:19 executing program 3: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000009c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000700)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) fchdir(r2) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@gcm_256={{0x304}, "e53886a72afa65df", "bd13c0706c2b22b6bbacfb7c4f8c7e32425e7040faee88f3ddbcc66cc54b95aa", "c38a428f", "46ba08a76ca11f91"}, 0x38) [ 287.477209] audit: type=1400 audit(1582774759.413:65): avc: denied { map } for pid=8831 comm="syz-executor.1" path="socket:[33472]" dev="sockfs" ino=33472 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 [ 287.578639] Process accounting resumed 03:39:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r1, 0xc01064c7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000004c0)="b805000000b951000000e40109c1c146a78900000066ba2100b067ee66ba4100edb9800000c00f32260f208466ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4f}], 0x1, 0x23, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000180)={0x5, 0x400, 0x1, 'queue0\x00', 0x401}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r3, 0xc01064c7, &(0x7f0000000140)={0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r3, 0x402c5342, &(0x7f0000000440)={0x9cf, 0x7, 0x5, {0x9053}, 0x0, 0x2}) r7 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, 0x0) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x2]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) creat(0x0, 0xbc9dc8fbd81cb4b1) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, 0x0) r8 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r8, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) r9 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000540)=""/107) sendfile(r8, r9, 0x0, 0x10000) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:39:19 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2ceb3504df6ead74ed8a60ab563e98b592a3d27a7082dbb78ab0200ba3da8b7f56445ab100621d6234555c08dc5404738f10004fd1b3786cd89e9b08e3f5972fe9ca1e86323e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d000000000000000000000083e37f932a6b342390e27b62767e1dd5abdba8afe51cf610691e711b8e34b1cd3e381a3acaecbbbe3aef8276ad68f0ba06d89dbb3b8ed6"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x200000000000000, 0x100000000}}, 0x30) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="00fb005ecba17e1a2161354c0fb845346ad0d67afdeb65dc65c4f520bb3ba13077eba2bced4c112066989c256eab0fc410c16f3bc5a19950be8be43461fd5313b9afbfc4caed36e878497275836c7db603584bf61b787fd5bd02a407f2b58e01d9c6362e34c04a21c4576aee5d0251003a5fefcd090e8e7b9ffab4aeedda887891b6e6787556fa0f501f804ed546a4cd15b31f1a7a69eb865b6466d44c1cc3b1cd401255bd93462cfdb782a74b0797935df5aed0"], 0xfeb4, 0x0) 03:39:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000880), &(0x7f0000000840)={[0x2]}, 0x8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) dup(r0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r6, 0x7003) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x0, 0x7ff}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 287.888711] audit: type=1804 audit(1582774759.823:66): pid=8859 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir132016459/syzkaller.M8p1ie/27/file0" dev="sda1" ino=16573 res=1 [ 288.068499] audit: type=1400 audit(1582774759.843:67): avc: denied { create } for pid=8835 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 [ 288.199490] audit: type=1804 audit(1582774759.853:68): pid=8859 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir132016459/syzkaller.M8p1ie/27/file0" dev="sda1" ino=16573 res=1 03:39:20 executing program 0: rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$getsig(0x2, 0x0, 0x0, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) socket$kcm(0x29, 0x4, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000100)=@x25={0x9, @null=' \x00'}, 0x80, 0x0}, 0x2c010) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) sendmsg(0xffffffffffffffff, 0x0, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xc56) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) 03:39:20 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) [ 288.317129] Process accounting resumed 03:39:20 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 288.445512] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 03:39:20 executing program 2: mkdir(0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r0 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6bed234f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, 0x1}, 0x0, 0x5, r2, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_mr_cache\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x2040, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r4, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b0000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r6 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000380)={r4, r5}) sendmsg$rds(r6, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1}, 0x0) 03:39:20 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) [ 288.576865] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.586663] bridge0: port 1(bridge_slave_0) entered disabled state 03:39:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x0) ppoll(&(0x7f00000001c0), 0x0, &(0x7f0000000880), &(0x7f0000000840)={[0x2]}, 0x8) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) dup(r0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r6, 0x7003) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x0, 0x7ff}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x1, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 03:39:20 executing program 1: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getsig(0x2, r0, 0x0, 0x0) r1 = getpgrp(r0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xc1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r2, r3, 0x0, 0x10003) [ 288.657162] device bridge0 entered promiscuous mode 03:39:20 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 288.761242] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 288.781291] audit: type=1804 audit(1582774760.683:69): pid=8900 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir722999696/syzkaller.4ejVmz/19/file0" dev="sda1" ino=16580 res=1 03:39:20 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) 03:39:21 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:21 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) [ 289.432605] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 289.459507] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.466179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.473008] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.479545] bridge0: port 1(bridge_slave_0) entered forwarding state 03:39:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r6, @ANYBLOB="3f00000000000c4100000088001462726f6164636173742d6c696e6b0000"], 0xa4}, 0x1, 0xfffffff0}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r6, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x5}}, [""]}, 0x24}}, 0x44000) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, &(0x7f0000000040)) [ 289.546447] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 289.557892] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.564484] bridge0: port 1(bridge_slave_0) entered disabled state 03:39:21 executing program 0: rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f00000000c0)) ptrace(0x10, 0x0) ptrace$getsig(0x2, 0x0, 0x0, 0x0) getpgid(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) socket$kcm(0x29, 0x4, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000100)=@x25={0x9, @null=' \x00'}, 0x80, 0x0}, 0x2c010) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) sendmsg(0xffffffffffffffff, 0x0, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xc56) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x8100, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100400200ff050005001201", 0x2e}], 0x1}, 0x0) 03:39:21 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) 03:39:21 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) 03:39:21 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$ax25(r1, &(0x7f00000004c0)={{0x3, @default}, [@netrom, @remote, @rose, @remote, @rose, @rose, @null, @netrom]}, &(0x7f0000000040)=0x48) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x2, &(0x7f0000000280)=[{&(0x7f00000001c0)="73bdb30f8f8e0ef08e9aa40a7592cc2eec84709a72247d4538c9b85cc23a94673fd3625b3b865baff50f1085eb8ada4ca0bd7fc701af7d221be94c95ebbd1df62b9a85", 0x43, 0x100}, {&(0x7f0000000240)="9634e4e7906edaa2055f43379f986ec10a49a7", 0x13, 0x1}], 0x800008, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 289.959515] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 289.988574] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.995128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.001877] bridge0: port 1(bridge_slave_0) entered blocking state 03:39:21 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x2) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x18943, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10040, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000380)}, 0x11401, 0x0, 0x80000000, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) flock(0xffffffffffffffff, 0x2) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0xff) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x8000000000000100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) pwritev(r6, &(0x7f00000006c0)=[{&(0x7f0000001940)="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", 0x1000}, {&(0x7f0000000680)="f77707794fd4ad9cbb4fddb259072ee0a113a769bb3f00"/32, 0x20}, {&(0x7f0000001880)="8725e77aabb9fcd3375187358b4e5b628d844e3361c4ff212d39fc935ef31e2a4120eef105dde98e51412401f24b9cefcdc3ba5d3c8367ba759049d88d907e71ba6d73f5baff515a364bba499481a289c0ab2597d6692a0c0bb7d61af0504546e15d6d72eac2807fce9847a8e8fe7ef9ecf4ba73fd00fc9121466d29fbc0e580ed26c2bc9be13c4739ffee5a481dddeeaef5b11e", 0x94}], 0x2, 0x9) r7 = open(&(0x7f0000000880)='./file0\x00', 0x0, 0x0) fchdir(r7) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r10 = accept$ax25(r9, &(0x7f0000000200)={{0x3, @default}, [@bcast, @netrom, @remote, @null, @netrom, @bcast, @remote, @bcast]}, &(0x7f00000003c0)=0x8e) pwritev(r10, &(0x7f0000000300)=[{0x0}], 0x39, 0x1) syz_open_procfs(0x0, &(0x7f0000000140)='net/dev_mcast\x00') openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r7, 0x40a85323, &(0x7f00000007c0)={{0x80, 0x1}, 'port1\x00', 0x0, 0x100002, 0x5, 0x1, 0x8, 0xcb94, 0x3, 0x0, 0x6, 0xfa}) ioctl$UI_SET_SWBIT(r3, 0x4004556d, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/bluetooth/6lowpan_enable\x00', 0x2, 0x0) r11 = creat(&(0x7f00000002c0)='./file0\x00', 0x116) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r11, 0xc0884123, &(0x7f0000000480)={0x2, "c04c76ac1d8199f9d8b3b7470346d7791f41555485c81dda5b57c7a82b843abefafcf8e3ef2edc46db9be306787409670b62626fa46b39303f0a730175bf7501", {0xc, 0xfffffffffffffc00}}) r12 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x400, 0x4000) r13 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r13) accept$unix(r12, &(0x7f0000000740)=@abs, &(0x7f0000000040)=0x6e) flock(0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net/syz0\x00', 0x1ff) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) syz_init_net_socket$nfc_raw(0x27, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'\x00', 0x100}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) sendfile(r0, r0, 0x0, 0x40fdf) [ 290.008535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.025993] EXT4-fs (loop3): unable to read superblock [ 290.066587] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 03:39:22 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f0000000100)='./bus\x00', r3, r4, 0x1000) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r5, &(0x7f0000000100)='./bus\x00', r6, r7, 0x1000) setresgid(r4, 0xee01, r7) vmsplice(r1, &(0x7f00000001c0), 0x0, 0x5) close(r1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="000500000000"], 0x1}}, 0x0) r8 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="340000001400090600000000000000000a000000", @ANYRES32=r9, @ANYBLOB="0800080014000200ff01cdc200c54b7a0b652c6f203772de818d3de7d6f61a5f42d88597d91c7d20e8e915fbdd3080067aeae14a0f8dea12264802062d610addfdc603ae9821f167cf038e3ed95e9e9dc86bcf8cfc6d438726d97388957144b31abbb6882411b3218fa2783a2172525ab1cf2dc456bc9acf3e83129fc8c3fb1004619363f7e66b280502aa235ee5c9d7a5c6e2f3ef4da02b899762579c5e6cdb68dbbee87c8e3fe656077a4de91fee2b9e2234db1c5757e60e04d5a5ca64a944a8839689f24ab6cf698502b380003a77cfd78165588a5e936d9754b60d73c3bce4089e73cd493c9b5650230f777e20cb45602335f6146f990a7bba6585d10f46c6"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000002, 0x0) [ 290.131081] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.138571] bridge0: port 1(bridge_slave_0) entered disabled state 03:39:22 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) [ 290.178600] EXT4-fs (loop3): unable to read superblock 03:39:22 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$VT_DISALLOCATE(r4, 0x5608) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 290.224038] audit: type=1804 audit(1582774762.163:70): pid=8980 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir906931129/syzkaller.AJRNEO/18/file0" dev="sda1" ino=16576 res=1 03:39:22 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) 03:39:22 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) 03:39:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000000)={0x8}, 0x4) connect$inet6(r3, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:39:22 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) read(0xffffffffffffffff, &(0x7f0000000340)=""/175, 0xaf) r1 = getpid() fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) perf_event_open(&(0x7f0000000880)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x3}, 0x9120, 0x3, 0x6, 0x6, 0x8, 0x3f, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in6, @in=@broadcast}}, {{@in=@loopback}}}, &(0x7f0000000040)=0xe8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x440101, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="01f399dc4600000086cb0f4c97c523fb2779274c0c4f2d9d5ce7c4dbc54eec71489bd351267f86576b44677c1bc00b1b0e64575b917ac7a11129b9e74849a09e48cc56cf830779ce4f2eea0d08c7c23ca52418b0523c27f43424cb95558991b9abdfc21fcf552f03cba1d30e8766ed6f"], &(0x7f0000000000)=0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:39:22 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) 03:39:22 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x40000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@empty, @in6=@remote}}, {{@in=@empty}, 0x0, @in6=@remote}}, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@local}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000780)=0x10d) socket$kcm(0x29, 0x5, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x40602, 0x1}, 0x3c) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x40000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@empty, @in6=@remote}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) r4 = socket$netlink(0x10, 0x3, 0x0) writev(r4, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000d00ea1100000005000000", 0x29}], 0x1) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r4, &(0x7f0000000540)={&(0x7f00000000c0), 0xc, &(0x7f0000000500)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4c000000010801080000000000000000000000030973795731000000002c00048008000140000000050800014000000000080001400001000008000240fffffffd0800014000001000"], 0x4c}, 0x1, 0x0, 0x0, 0x48010}, 0x5) r5 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0}, 0x78) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r5, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="38017f00", @ANYRES16=r6, @ANYBLOB="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"], 0x138}, 0x1, 0x0, 0x0, 0x200400c1}, 0x48000) r7 = socket$alg(0x26, 0x5, 0x0) r8 = accept$alg(r7, 0x0, 0x0) r9 = dup(r8) write$UHID_DESTROY(r9, &(0x7f0000000080), 0xfff2) getsockopt$inet_mreqn(r9, 0x0, 0x24, &(0x7f0000000380)={@multicast2, @empty}, &(0x7f00000003c0)=0xc) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x58, r6, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x60000880) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @dev, @broadcast}, &(0x7f00000015c0)=0xc) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={r10, @loopback, @remote}, 0xc) r11 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, r11, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00', 0x5}, 0x2c) r12 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r12, 0x0, 0x482, &(0x7f0000000000)={0x11, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1000000, 'lblcr\x00'}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001600)={0x0, @remote, @empty}, &(0x7f0000000100)=0xfffffe78) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r13}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002580)={r2, 0x0, &(0x7f00000024c0)=""/155}, 0x20) [ 290.756925] audit: type=1804 audit(1582774762.693:71): pid=8982 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir906931129/syzkaller.AJRNEO/18/file0" dev="sda1" ino=16576 res=1 03:39:22 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f00000001c0)={0x5, @multicast}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000005c0)={0xa00000, 0x5e8, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000580)={0x9a0917, 0x2, [], @value=0x1}}) bind(r4, &(0x7f0000000600)=@generic={0x1a, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d000000000000000000001a00", @ANYRES32=r5, @ANYBLOB="0000000effffffff0000000008000100686866000c0008"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100004800, 0x0) [ 290.814844] audit: type=1804 audit(1582774762.693:72): pid=8980 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir906931129/syzkaller.AJRNEO/18/file0" dev="sda1" ino=16576 res=1 [ 290.945507] audit: type=1400 audit(1582774762.853:73): avc: denied { map_create } for pid=9014 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 290.967378] selinux_nlmsg_perm: 165 callbacks suppressed [ 290.967407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 [ 290.987813] netlink: 'syz-executor.3': attribute type 13 has an invalid length. 03:39:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="a60000000000000000023fde76624c56b94edd57573805a9ae899200cbb70d03c4b3ec184da8e90d12c0962740301bc93a6fc3c4d6ac9b8d8e5b4ae0f521d6b34174ccf5d1d4fc36484347d3561ed248ba2cb4a2793df381ea6de6e5b23833ea"]) [ 291.006182] audit: type=1400 audit(1582774762.913:74): avc: denied { map_read map_write } for pid=9014 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 291.053255] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 [ 291.074777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 03:39:23 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000040)={'security\x00'}, &(0x7f00000000c0)=0x54) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000200)="d43bb4185658b15e90ad7ceed2ae05e0729484a3898e62c1dccca657492a64eed3f663b94d04e94ee6bafb67aea02807", 0x30}, {&(0x7f0000000380)="824bd31c4fa03743b2ab1311eb27fba318c212ec77042663c85708f63db6f63d788abbf9d3ac2997d48528111c307660c28e3f8954774d861ae795d54d5d50daa1785901169848ea8b47b46e", 0x4c}, {&(0x7f0000000400)="e664402718d98de9fc765a685f7048196abf9fec293f4ccd7183e39abf431ddd15608216d76b593fe6e95f2b4609ad6d88f23f38f63d1abb7d5e345f0694ba4263900daaf6a6e6d86acd983ba86df6dea7aaf46a9609a079706ceb3f2441a274b7fb34a9a5f6fef958ec5e46fb27de26ace8384c0b112427a8adcf49307f88b59ce9a9f442f408b32d947cc0d89865f2c8748dda7e13b2d6dc55d9deeebd4e02", 0xa0}, {&(0x7f0000003340)="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", 0x1c9}], 0x4, 0x0, 0x0, 0xffffffe0}}], 0x2c, 0x24004000) [ 291.102282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 [ 291.115015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 [ 291.135089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 [ 291.175734] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 [ 291.201013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 [ 291.228574] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 [ 291.246539] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9029 comm=syz-executor.2 03:39:23 executing program 2: epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mknod(&(0x7f0000000240)='./file0\x00', 0x80c0, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x19000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000380)=ANY=[@ANYBLOB="ffffffffffffffffffffffff08004500000d0000584818420090780000d687000000001f9129b4f377995157000000000000000000000000006c9b7e6d0f6656336e7da81bb9421d11b4e2c20f15960bea381ca2d3c815f66b1f651cb41aa0624e42e846cb9f69a276587067358a0c179b7830247e5b07d27b75011377e3867e53df421e99428b029dfbee996ab019f47ee02f22af137c01132949dde27ed38bda243212c8a31572c2cb77d13acbf09d284b214875f376e4d7"], 0x0) semget$private(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) read$alg(r0, &(0x7f00000004c0)=""/4096, 0x1000) r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000140)) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x800000020000061a, 0x800007f, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r2 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f0000000480)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000140)=0x7, 0x4) recvmmsg(r2, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a308e622d11383a51150616af67fc4cc2da4e65d01f21fb1ac7f2bba01a1bc311c17bb15a57b69a02baa9bc17749e863e28190187273a79e525e87e498ef4629f13dac4921b8f65ed2c32aaf1ab9444e08f5145cc025fdd72a547ab"], 0x5e) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x20}}}}, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x281, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7fdffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x40000080806, 0x0) [ 291.307243] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 291.337499] gfs2: invalid mount option: ¦ [ 291.341818] gfs2: can't parse mount arguments 03:39:23 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) read(0xffffffffffffffff, &(0x7f0000000340)=""/175, 0xaf) r1 = getpid() fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r3, 0x0, 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) perf_event_open(&(0x7f0000000880)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x3}, 0x9120, 0x3, 0x6, 0x6, 0x8, 0x3f, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in6, @in=@broadcast}}, {{@in=@loopback}}}, &(0x7f0000000040)=0xe8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x440101, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="01f399dc4600000086cb0f4c97c523fb2779274c0c4f2d9d5ce7c4dbc54eec71489bd351267f86576b44677c1bc00b1b0e64575b917ac7a11129b9e74849a09e48cc56cf830779ce4f2eea0d08c7c23ca52418b0523c27f43424cb95558991b9abdfc21fcf552f03cba1d30e8766ed6f"], &(0x7f0000000000)=0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 03:39:23 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:23 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:23 executing program 3: r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x98428d57a99b5f44) io_setup(0xc, &(0x7f0000000100)=0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000000)=0xbb0a) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0x0) fallocate(r2, 0x100000003, 0x0, 0x28120001) io_submit(r1, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 03:39:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) fallocate(r2, 0x0, 0x9, 0xbe9) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lower`ir=.:file0']) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) lseek(r3, 0x1, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000400)={0x1f, @any, 0xf}, 0xa) getdents64(r3, 0x0, 0x800000000000000) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{}, {}, {0x0}]}) r5 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$pptp(0x18, 0x1, 0x2) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r9, r8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000380)={0x1, 0x70, 0x6, 0x4, 0xff, 0xbd, 0x0, 0x0, 0x4424, 0x7, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x2, @perf_config_ext={0x7, 0x3f}, 0x4a310, 0xa35, 0x585, 0x4, 0x4, 0x3ff, 0x100}) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f00000002c0)={0x5, 0x7, 0x4, 0x400000, 0x81, {0x77359400}, {0x3, 0x2, 0xff, 0x3, 0xff, 0x3f, "0f692373"}, 0x9, 0x2, @offset=0x7, 0xfffffffe, 0x0, r3}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000340)={@mcast2, 0x9, 0x1, 0x3, 0x2, 0x8, 0x2}, 0x20) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000240)={r4, 0x2}) 03:39:23 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000300), &(0x7f0000000380)=0x4) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000001c0)={@dev, @remote, 0x0}, &(0x7f0000000240)=0xc) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, r3, 0x800, 0x70bd25, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4004000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000600)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x58, r3, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x643100c196bc3100}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x33}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0xcf}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xbe}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x5}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x1}]}, 0x58}}, 0x804) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="97d02f4bec69039d1feb20ff0d07f53cb2c0a1d8d5ad0576b049817bfc20caa49ebee626bf3b514978d02170f5d085917ffb96dd6605475882467087f4fb1ecf60", 0x41}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x2f8}, 0x0) [ 291.787462] overlayfs: unrecognized mount option "lower`ir=.:file0" or missing value 03:39:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="900000000202010200000000000000800000000264000280060003400001000006000340000100000c000280050001000600000006000340000100000c000222ca2a8780050001002f00000006000340000100000c000280050001003a000000060003400004000006000340000000e40b00028005000100880000001800030080000080080001007f00000108000200"], 0x90}, 0x1, 0x0, 0x0, 0x20000011}, 0x48050) memfd_create(0x0, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000200)) [ 291.869677] overlayfs: unrecognized mount option "lower`ir=.:file0" or missing value 03:39:23 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x800, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000040)={0x9, 0x20, 0x8347, 0x404}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x8001, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) getpid() gettid() r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f00000000c0)) ptrace(0x10, r3) ptrace$getsig(0x2, r3, 0x0, 0x0) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f00000000c0)) ptrace(0x10, r4) ptrace$getsig(0x2, r4, 0x0, 0x0) sched_setscheduler(r4, 0x2, &(0x7f0000000280)=0x5) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000001c0)=0x4) creat(&(0x7f0000000180)='./bus\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) getpid() r6 = accept4$inet(r5, 0x0, &(0x7f0000000080), 0x80400) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000200)) fcntl$getown(r6, 0x9) r7 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r9 = dup2(r7, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r9, 0xc4c85512, &(0x7f0000001400)={{0x3, 0x0, 0x2, 0x3ff, 'syz1\x00', 0x701}, 0x0, [0x1, 0x5, 0x3, 0x0, 0x0, 0x6, 0x9, 0xe4, 0x0, 0x0, 0x4, 0x400, 0x7, 0x1, 0x0, 0x5fa, 0x0, 0x7, 0x5, 0x4, 0x2b0f, 0x1, 0x7, 0x3, 0x0, 0x7ff, 0xffff, 0x401, 0x9, 0x9, 0x0, 0x1, 0x407, 0x2, 0x40, 0x8, 0x9, 0x3ff, 0x92, 0xffffffffffffffa2, 0xb262, 0x8, 0x6, 0x3b3c67dc, 0x2, 0xffffffffffffffc0, 0xffffffffffffe56e, 0xb38, 0x5, 0xffffffffffff8000, 0xff, 0x100000003, 0xef, 0x75, 0xfb08, 0x3ff, 0x400, 0x0, 0xffffffffffffff01, 0x1000, 0x5, 0xfffffffffffffc35, 0x0, 0x6, 0xffffffffffff06fa, 0x2, 0x80000001, 0x3, 0x1000, 0x401, 0x2, 0x7fffffff, 0x203, 0x7, 0x0, 0x10001, 0x8001, 0x81, 0x6, 0x81, 0x6, 0xfffffffffffff619, 0x0, 0xffffffff, 0x307, 0xffffffffffff0001, 0x80000000, 0x1f, 0x46, 0xc685, 0x6, 0x0, 0x6, 0x6000, 0x100, 0x9, 0x101, 0x10001, 0x46da, 0xffffffffffffffe1, 0x9, 0x67, 0x401, 0x2, 0xffffffff, 0x536, 0x7623de32, 0x1, 0x2, 0x7, 0xd2964d1, 0x8, 0x7, 0x10001, 0x1, 0xc386, 0x5, 0x6, 0xfff, 0x4f, 0xfffffffffffffff9, 0x8, 0x80, 0x1749d72f, 0x5, 0x0, 0xedf, 0x6]}) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x10000, 0x0) write$UHID_INPUT(r10, &(0x7f00000003c0)={0x8, {"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", 0x1000}}, 0x1006) 03:39:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) fallocate(r2, 0x0, 0x9, 0xbe9) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lower`ir=.:file0']) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) lseek(r3, 0x1, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000400)={0x1f, @any, 0xf}, 0xa) getdents64(r3, 0x0, 0x800000000000000) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{}, {}, {0x0}]}) r5 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r7 = dup2(r5, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$pptp(0x18, 0x1, 0x2) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r9, r8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r9, 0x4008240b, &(0x7f0000000380)={0x1, 0x70, 0x6, 0x4, 0xff, 0xbd, 0x0, 0x0, 0x4424, 0x7, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x2, @perf_config_ext={0x7, 0x3f}, 0x4a310, 0xa35, 0x585, 0x4, 0x4, 0x3ff, 0x100}) ioctl$VIDIOC_PREPARE_BUF(r7, 0xc058565d, &(0x7f00000002c0)={0x5, 0x7, 0x4, 0x400000, 0x81, {0x77359400}, {0x3, 0x2, 0xff, 0x3, 0xff, 0x3f, "0f692373"}, 0x9, 0x2, @offset=0x7, 0xfffffffe, 0x0, r3}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r10, 0x29, 0x20, &(0x7f0000000340)={@mcast2, 0x9, 0x1, 0x3, 0x2, 0x8, 0x2}, 0x20) ioctl$DRM_IOCTL_NEW_CTX(r3, 0x40086425, &(0x7f0000000240)={r4, 0x2}) 03:39:23 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) [ 292.048573] audit: type=1400 audit(1582774763.963:75): avc: denied { map } for pid=9101 comm="syz-executor.3" path="/dev/ashmem" dev="devtmpfs" ino=18989 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 03:39:24 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:24 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xfffffffffffffeae, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffea8, 0x20000001}, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x129080) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x400, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x70, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={r5, 0xd7ea, 0x0, 0x3, 0x8c1, 0x6, 0x6, 0x3ff, {0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x5, 0x8001, 0x8, 0x5, 0x6}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r6, 0x9, 0x20}, &(0x7f00000002c0)=0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200085}) socketpair(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xfc115e87e6e908c9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f2, &(0x7f0000000000)='l0\x00') 03:39:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x4, 0xe}]}, 0x18}}, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x54, 0x0, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x44841}, 0x800) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x1406, 0x20, 0x70bd27, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008814}, 0x4000) 03:39:24 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000000c0)={0x7fff, 0x9, 0x4, 0x2, 0x1, {0x77359400}, {0x4, 0x8, 0x9, 0x0, 0x2, 0x9, "1f3648b3"}, 0x8, 0x3, @offset=0x2, 0x3, 0x0, r2}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r5 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000003c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r4, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0xd8, r5, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'gretap0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:syslog_conf_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_SECCTX={0x2d, 0x7, 'system_u:object_r:systemd_unit_file_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x41}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr="cc058a91615632ccd22ca451587e1148"}]}, 0xd8}, 0x1, 0x0, 0x0, 0x24008000}, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000280)={r7, @in={{0x2, 0x4e24, @empty}}, 0x3ff, 0x8, 0x5f9, 0x7, 0x4}, &(0x7f0000000340)=0x98) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a000000000001f6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 03:39:24 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) [ 292.397405] overlayfs: unrecognized mount option "lower`ir=.:file0" or missing value 03:39:24 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) socket$unix(0x1, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:24 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x0}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x58}}, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040)='NLBL_MGMT\x00') pause() sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_MGMT_A_DOMAIN={0xc, 0x1, 'keyring\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @ipv4={[], [], @remote}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) r5 = socket$pptp(0x18, 0x1, 0x2) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r6, r5) fanotify_mark(r4, 0x0, 0x1, r6, &(0x7f00000001c0)='./file0\x00') [ 292.554551] BTRFS: device fsid 01f6f2a2-2997-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop2 03:39:24 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000600)={0x1f, {0x8, 0x8001, 0x0, 0x2, 0x0, 0x1000}}) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ext4\x00', 0x2002044, 0x0) write$binfmt_script(r1, &(0x7f0000000c80)=ANY=[@ANYBLOB="01"], 0x1) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000400)=0x2, 0x4) prctl$PR_SET_PTRACER(0x59616d61, r0) pipe(0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) io_setup(0x0, 0x0) pipe(&(0x7f0000000300)) lseek(0xffffffffffffffff, 0x800000, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, 0x0) io_submit(0x0, 0x0, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x20008004) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x80340, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000140)) 03:39:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x8) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000180)=0xe8) r6 = socket(0x10, 0x803, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x8) sendmsg$nl_route(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'ip6_vti0\x00', r8}) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r12, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) r13 = socket(0x10, 0x803, 0x0) r14 = socket(0x1, 0x803, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x8) sendmsg$nl_route(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r15}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1200000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="88000000", @ANYRES16=r1, @ANYBLOB="000125bd7000fcdbdf25030000002c000180080001008a30b7100c0d2d98bc43ded05db4585bbc1a21325cbabc487e77dca730a668e42bdfcdde6ffe08161dde9ff50079ad847bbc9a02f1b5539b8bb844522d356f0ccc458248e68c0e0ba26764c93c7b8210cc21d849dc15e925dad4aafbfcfed82e2a6fb7797968b8ec9a44f54acee6ef6ddf2b8f3cf49cd5129fc4c0b96e6769146105753583ed252b449dd631d2526600000000000000a765033ef2c992410877a701754cccf465b59d5941153ac3dd5e8950c2346622458be48853caf2086390bb", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000300010000002000018008000100", @ANYRES32=r15, @ANYBLOB="14000200766c616e3000000000000000000000000500050004000000050002000900000005000200ad00000005000500030000000500020008000000"], 0x88}, 0x1, 0x0, 0x0, 0x40000}, 0x880) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800e00010069703665727370616e0000000000008004001200060e02000000000086b3345ad890d074ca3de2027a9984e2352542c92f5eae8b6e44fbdfadbee9e14cf75782e07a066b6818db34ae9927437a4b709b58acad536f85c50d3e5829146017d63accdc2fa584c5ce"], 0x44}}, 0x0) 03:39:24 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) 03:39:24 executing program 2: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') socket(0x2000000000000021, 0x2, 0x10000000000002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x91}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r4, r5/1000+30000}, 0x1f, 0x97, 0x4}, 0x18) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000580), 0x12) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000340)) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 03:39:24 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 292.882798] IPv6: ADDRCONF(NETDEV_UP): bridge1: link is not ready [ 292.918768] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 292.974629] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 03:39:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80003, 0x27) r3 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$LOOP_SET_FD(r5, 0x4c00, r6) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x290, 0x0, 0x360, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x290, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0xad5}}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:39:25 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 293.170268] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 03:39:25 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) setpriority(0x1, 0x0, 0x10000) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 293.231918] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 03:39:25 executing program 0: syz_mount_image$tmpfs(&(0x7f00000000c0)='tmpfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'default', '', @void}}}]}) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 03:39:25 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:25 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000b, &(0x7f0000000300)=0x2, 0x4) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0xfffc, @local}, 0x10) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045005, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x4) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x40) ioctl$int_in(r3, 0x800000c0045005, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000000)) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000080)) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r4, 0x0, &(0x7f0000000080)=0x1007b) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r5, &(0x7f0000000140)=[{&(0x7f0000000040)=""/245, 0xf5}], 0x1, 0x800000) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r6, &(0x7f0000000140)=[{0x0}], 0x1, 0x800000) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000300)) 03:39:25 executing program 1: setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f0000000000)=[0x2, 0x2], 0x2) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) r4 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r6 = dup2(r4, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_AUTH_MAGIC(r6, 0x40046411, &(0x7f0000000180)=0x1) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="02000300925be98588eeedb87c061366440725c4418be2dadc6e", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x70, &(0x7f000059aff8)={r7, 0x1}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={r7, @in={{0x2, 0x4e22, @multicast1}}, 0x81, 0x200}, &(0x7f0000000100)=0x90) [ 293.677140] audit: type=1400 audit(1582774765.613:76): avc: denied { map } for pid=9222 comm="syz-executor.0" path="/dev/audio" dev="devtmpfs" ino=19030 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 03:39:27 executing program 1: setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000200)=[{{0x1, 0x0, 0x1, 0x1}, {0x0, 0x1, 0x1}}, {{0x1, 0x1}, {0x3}}, {{0x0, 0x0, 0x1, 0x1}, {0x1, 0x1, 0x1, 0x1}}, {{0x3}, {0x2, 0x0, 0x1}}, {{0x3, 0x0, 0x0, 0x1}, {0x3, 0x1}}, {{0x1, 0x1}, {0x3, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x1, 0x0, 0x1}}, {{0x4, 0x1}, {0x2, 0x0, 0x0, 0x1}}, {{0x0, 0x0, 0x1}, {0x4, 0x0, 0x1}}, {{0x4, 0x1}, {0x0, 0x1, 0x1}}], 0x50) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x0, r0, 0x0, 0x4, &(0x7f0000000140)) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfd, "0004001000", "3bd7f93d3898954ed02d83e57cb0b00e00"}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000001540)={{0x80}, 'port0\x00', 0xffffffffffdfffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) close(r1) 03:39:27 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:27 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540)=[{&(0x7f0000000440)=""/78, 0x4e}], 0x1, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:27 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000000b, &(0x7f0000000300)=0x2, 0x4) bind$inet(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0xfffc, @local}, 0x10) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045005, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x4) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x40) ioctl$int_in(r3, 0x800000c0045005, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000000)) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000080)) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r4, 0x0, &(0x7f0000000080)=0x1007b) ioctl$int_in(0xffffffffffffffff, 0x800000c0045005, &(0x7f0000000000)=0x7b) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r5, &(0x7f0000000140)=[{&(0x7f0000000040)=""/245, 0xf5}], 0x1, 0x800000) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r6, &(0x7f0000000140)=[{0x0}], 0x1, 0x800000) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000300)) 03:39:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0x2, 0x3, 0x100000001) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet(r1, &(0x7f0000000540)={0x2, 0x0, @multicast2}, 0x10) sendto(r1, &(0x7f00000003c0)="879d0ebf9cbb63fd9adcbe51b07b0429c3178dcd0c7a3926a73ce84de28ab0", 0xffc7, 0x8000, 0x0, 0x188) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x20b) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000000)='NLBL_UNLBL\x00') r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f00000000c0)=0x2, 0x4) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="0400000000000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7377c96db406f9fa38a6ed6bb1edc7c0320aecbe833423382acd28e3da07e9dad1158958d08d330b7ff3abf21005d8425d3b102ddd"]) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r6 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$pptp(0x18, 0x1, 0x2) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r8, r7) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000100)={0x0, 0xa95, 0xfffff800, 0x4000, r8}) openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x0, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) r10 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r11 = ioctl$KVM_CREATE_VM(r10, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r11, 0xae60) r12 = ioctl$KVM_CREATE_VCPU(r11, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r12, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r12, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r12, 0xae80, 0x0) mq_open(&(0x7f0000000180)='eth1eth0\x00', 0x40, 0x110, &(0x7f0000000240)={0x5, 0x91f5, 0xfff, 0x9}) syz_init_net_socket$x25(0x9, 0x5, 0x0) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendfile(r6, r5, 0x0, 0x80000005) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 03:39:27 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) socket$packet(0x11, 0x0, 0x300) socket(0x28, 0x1, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20, 0x6, @rand_addr="00526fc6c0584e76b6699e66dd0a5b0b", 0x2}, {0xa, 0x4e21, 0xff, @local}, 0x9, [0x4, 0x200, 0x1, 0xe8, 0x1, 0x3, 0x0, 0x81]}, 0x5c) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x7fff, 0x7, 0x4, 0x2000000, 0x1, {0x0, 0x7530}, {0x2, 0x0, 0x6, 0x7, 0x0, 0x1, "16636842"}, 0x0, 0x3, @userptr=0x9, 0x37e, 0x0, r0}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x12) socket$packet(0x11, 0x3, 0x300) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000200)=@rose={'rose', 0x0}, 0x10) sendto$inet(r1, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d003f00efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x23) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 295.864871] FAT-fs (loop2): Unrecognized mount option "swÉm´ùú8¦ík±íÇÀ2 [ 295.864871] 쾃4#8*Í(ãÚéÚщXÐ3 ó«òØB];-Ý" or missing value 03:39:27 executing program 1: r0 = getuid() syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x5, &(0x7f00000014c0)=[{&(0x7f0000000080)="99f0c518028a7f7aeb", 0x9, 0x8}, {&(0x7f0000000380)="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", 0x1000, 0x1}, {&(0x7f0000000100)="eacd1b4bb404a499283cafc680c1270bf56d81f200cae3218a96ae78b8ba3353e0b649baab92f41374ba3b4a2c0bde88340deb00f2061a2a1ddbae3f43370319c80ac02ffd37f7ee7c0af291362c75ccc9ae0e50ca6b5bdc5e4b918852f91f59f45dd6bbcfbdae9321f63e633a1dee94048b5a8e66dcadeea7cfe5e5bf51e1a3dffab858322eda5a16c8ee90a02341e25ee797c40ed64ba1c20e2817aabefe1f8d350888ba32920aac8402823e80", 0xae, 0x2}, {&(0x7f0000001380)="7f3ff05285c33c7d7e13a727183f1821de68be6eff493fe3a5f67f5d47d887b6541917ea169d4c7008409d1d63f7ffe89d822d4e00b5f21c6753f2d67eb1a49c4d1904871581870d75e19e17bb95233dc2a3c341ce11e986ccc40111a4d53e239edfb34d761b04b96daad32b9b1992231e81846e11cb410d7376e30a69319c5c48068bdfa98865e3db3fc40f0c1c062ad20854da2243afe5f152f08cfed6013f2e7d053793a1471325f85ebff4a3b4f05d71", 0xb2, 0x7}, {&(0x7f0000001440)="aafa35aaabe4af9f95abb0b91d8ae024684ca5eaa57aa4a512b8c7b96eea5166eb36e933a5d2609b6f515854f7d5c69de652100980e54d3a293702a3ee51db91ee0cec81ceb0be5ad20ba055abe5839a636b8519c705ed49872b56ca2191d0c71d", 0x61, 0x2000000020}], 0x12cc80, &(0x7f0000001540)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fowner_gt={'fowner>', r0}}, {@dont_measure='dont_measure'}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x17) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c86", @ANYRES32, @ANYBLOB="f87f5ca459ca1d2fc7e6986a9e6b733845fb0edbec5bd53e80e7b2f1048ba240ee97762ec617925d95603688eb0bd6e5be9435b27109a63fe91119480a40280013921c1c9c4513b5f506e4fd37567d82296b615bc92fdb44dc4eb7139aef9c47f8b3d1c4605aa6f789d178c6dbe83fd7877a5b0464454e9c36f27c7e69cee5da4ac9c3eb383c2526a22dc6ba53f8bfe736b30ea2d1119ce3fccffc0fb9b05939c4e3f6e801cb78ec7086aa80cd1cbe1af0d348febd518a93cd5b4dc0ca44e9ed18c1dd2e9202624eb8203ee9f5bc7b9653d949b1302683e041073639799e9265f700000000"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x800000000000ff00) 03:39:27 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:27 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) mq_timedreceive(r1, &(0x7f0000000540)=""/129, 0x81, 0x37, &(0x7f0000000140)={0x0, 0x989680}) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:28 executing program 0: creat(0x0, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x7f}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() openat$hwrng(0xffffffffffffff9c, 0x0, 0x228800, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x0, @multicast2}, &(0x7f0000000700)=0x10, 0x80800) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000740)={0x2, 'vxcan1\x00'}, 0x18) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000080)={0x9, 0x7, 0x40, 0xa6e, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}]}) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x109000) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6020920000540600fe8000000000000000000000000000bbfe8000000000000000000000000000aa00004e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50020000907800000504000013124851156e15d0b6e9539e9f76e559f6edfe09f98943177a76b7000f5c0dc8e8b3d84567dcd4e7b79e0502fe0df989622b523a3168000000000000"], 0x0) r3 = open(0x0, 0x0, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000480)=0x0, &(0x7f00000005c0)=0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x16, 0x23, &(0x7f0000000940)=ANY=[@ANYBLOB, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x1000, 0x94, &(0x7f00000002c0)=""/148, 0x41000, 0x4, [], r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x6}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x0, 0x0, 0x7fff}, 0x10, 0x0, r3}, 0x78) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCGETLINKNAME(r5, 0x89e0, &(0x7f0000000180)={0x4, 0x1}) [ 296.065242] selinux_nlmsg_perm: 16 callbacks suppressed [ 296.065262] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=9248 comm=syz-executor.2 03:39:28 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 296.311360] device vxlan0 entered promiscuous mode [ 296.323821] FAT-fs (loop2): Unrecognized mount option "swÉm´ùú8¦ík±íÇÀ2 [ 296.323821] 쾃4#8*Í(ãÚéÚщXÐ3 ó«òØB];-Ý" or missing value 03:39:28 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 296.405512] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=29231 sclass=netlink_xfrm_socket pig=9296 comm=syz-executor.2 03:39:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x3, &(0x7f00000000c0)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x84}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffefffe}, 0x10}, 0x78) 03:39:28 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:28 executing program 3: ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f00000000c0)) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000080)=0x6) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) getpgid(0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$SNDRV_PCM_IOCTL_STATUS32(r5, 0x806c4120, &(0x7f0000000000)) 03:39:28 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x4000000, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x70, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r8, 0x757}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000180)={r9, 0x1}, &(0x7f00000001c0)=0x8) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="020400000ef8af7fb6f630fbdbd0c7bebb1c56eb8113363126c7d713dfe3d793ee7d0d1cda0500000000009a672f117a00653e0da8e3f1dd53644f58d815d3790ab7765e800b70e6707612d45a44461358bc7cf27d1fd24b755bd5970f6fe4bce391108595ee15305ef940798000000084ba10a987c2000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x7c, &(0x7f000059aff8)={r10}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r11}, &(0x7f0000000540)=0x8) 03:39:28 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24}}}, 0x88) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) r1 = socket(0x1e, 0x5, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x6, 0x1, 0x101, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xf8, 0x0, 0x40, 0x0, 0x0, 0x41bf, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x400}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xd3}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x8) unshare(0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') r3 = open(&(0x7f0000001680)='./file0\x00', 0x0, 0x80) ioctl$SOUND_MIXER_READ_VOLUME(r3, 0x0, &(0x7f0000000200)) r4 = socket(0x10, 0x2, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) setns(r2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r7, 0x1}, 0x1c}}, 0x0) gettid() syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) syz_open_procfs(r8, &(0x7f00000003c0)='net/ip6_tables_matches\x00') r9 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) lseek(r9, 0x0, 0x3) clone(0x14124902, 0x0, 0x0, 0x0, 0x0) [ 297.039082] audit: type=1400 audit(1582774768.973:77): avc: denied { map } for pid=9337 comm="syz-executor.2" path="/dev/vcs" dev="devtmpfs" ino=3854 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:tty_device_t:s0 tclass=chr_file permissive=1 [ 297.120882] audit: type=1400 audit(1582774769.043:78): avc: denied { sys_admin } for pid=9337 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 297.158068] audit: type=1400 audit(1582774769.093:79): avc: denied { dac_override } for pid=9341 comm="syz-executor.2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 03:39:29 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) splice(r4, &(0x7f0000000500), r2, &(0x7f0000000540)=0x20, 0x8, 0x8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={@initdev, @local, 0x0}, &(0x7f0000000140)=0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r9, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000200)={@broadcast, @rand_addr, 0x0}, &(0x7f0000000240)=0xc) r11 = socket(0x10, 0x803, 0x0) r12 = socket(0x1, 0x803, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x8) sendmsg$nl_route(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r13}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00', r13}) r15 = socket(0x10, 0x803, 0x0) r16 = socket(0x1, 0x803, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x8) sendmsg$nl_route(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000580)=@ipv4_delrule={0x78, 0x21, 0x100, 0x70bd2b, 0x25dfdbff, {0x2, 0x14, 0x14, 0x2f, 0x81, 0x0, 0x0, 0x0, 0x10018}, [@FRA_DST={0x8, 0x1, @broadcast}, @FRA_FLOW={0x8, 0xb, 0x7fffffff}, @FRA_GENERIC_POLICY=@FRA_IIFNAME={0x14, 0x3, 'hsr0\x00'}, @FRA_DST={0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, @FRA_GENERIC_POLICY=@FRA_PRIORITY={0x8, 0x6, 0x8}, @FRA_FLOW={0x8, 0xb, 0x473}, @FRA_GENERIC_POLICY=@FRA_TABLE={0x8}, @FRA_GENERIC_POLICY=@FRA_IP_PROTO={0x5, 0x16, 0x32}, @FRA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @FRA_DST={0x8, 0x1, @rand_addr=0x400004}]}, 0x78}}, 0x20004841) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0x190, r1, 0x20, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r6}, {0x12c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r10}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r14}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r17}}}]}}]}, 0x190}, 0x1, 0x0, 0x0, 0x4000001}, 0x20004400) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x18, 0x3, 0x400100]}, 0x3c) 03:39:29 executing program 1: r0 = getuid() syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x5, &(0x7f00000014c0)=[{&(0x7f0000000080)="99f0c518028a7f7aeb", 0x9, 0x8}, {&(0x7f0000000380)="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", 0x1000, 0x1}, {&(0x7f0000000100)="eacd1b4bb404a499283cafc680c1270bf56d81f200cae3218a96ae78b8ba3353e0b649baab92f41374ba3b4a2c0bde88340deb00f2061a2a1ddbae3f43370319c80ac02ffd37f7ee7c0af291362c75ccc9ae0e50ca6b5bdc5e4b918852f91f59f45dd6bbcfbdae9321f63e633a1dee94048b5a8e66dcadeea7cfe5e5bf51e1a3dffab858322eda5a16c8ee90a02341e25ee797c40ed64ba1c20e2817aabefe1f8d350888ba32920aac8402823e80", 0xae, 0x2}, {&(0x7f0000001380)="7f3ff05285c33c7d7e13a727183f1821de68be6eff493fe3a5f67f5d47d887b6541917ea169d4c7008409d1d63f7ffe89d822d4e00b5f21c6753f2d67eb1a49c4d1904871581870d75e19e17bb95233dc2a3c341ce11e986ccc40111a4d53e239edfb34d761b04b96daad32b9b1992231e81846e11cb410d7376e30a69319c5c48068bdfa98865e3db3fc40f0c1c062ad20854da2243afe5f152f08cfed6013f2e7d053793a1471325f85ebff4a3b4f05d71", 0xb2, 0x7}, {&(0x7f0000001440)="aafa35aaabe4af9f95abb0b91d8ae024684ca5eaa57aa4a512b8c7b96eea5166eb36e933a5d2609b6f515854f7d5c69de652100980e54d3a293702a3ee51db91ee0cec81ceb0be5ad20ba055abe5839a636b8519c705ed49872b56ca2191d0c71d", 0x61, 0x2000000020}], 0x12cc80, &(0x7f0000001540)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fowner_gt={'fowner>', r0}}, {@dont_measure='dont_measure'}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x17) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xaf93010e, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e0000000400028008000a0036459cdb26cd03ccb7e638a66c86", @ANYRES32, @ANYBLOB="f87f5ca459ca1d2fc7e6986a9e6b733845fb0edbec5bd53e80e7b2f1048ba240ee97762ec617925d95603688eb0bd6e5be9435b27109a63fe91119480a40280013921c1c9c4513b5f506e4fd37567d82296b615bc92fdb44dc4eb7139aef9c47f8b3d1c4605aa6f789d178c6dbe83fd7877a5b0464454e9c36f27c7e69cee5da4ac9c3eb383c2526a22dc6ba53f8bfe736b30ea2d1119ce3fccffc0fb9b05939c4e3f6e801cb78ec7086aa80cd1cbe1af0d348febd518a93cd5b4dc0ca44e9ed18c1dd2e9202624eb8203ee9f5bc7b9653d949b1302683e041073639799e9265f700000000"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x800000000000ff00) 03:39:29 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0xff, 0x40000004, 0x0, 0x0, 0x0, 0x4cd, 0x0, 0x0, 0x7f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2d1], 0x10000, 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_MODULATOR(r5, 0xc0445636, &(0x7f00000000c0)={0x80, "a57d2fb84e18b3a1f9ab077144de2fdc7498ddabace374fb0ca3cb43b9f84534", 0x40, 0xdb, 0x9, 0x1, 0x1}) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x9f, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='tails=small,jqfmtvfsv0', @ANYRESOCT=r2]) 03:39:29 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:29 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000180)='\xa5E\f\x87\xda\n\xd9F\xde\x8c$3\x92\xe6e\xe4\xec\xad\x1c.\b\x06\xa76\x82F\xff\xff\xff\x7f\x00\x00\x00\x00\x9af\xaeM\xc4', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x98000003, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='autogroup\x00') socket$nl_audit(0x10, 0x3, 0x9) 03:39:29 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000180)='\xa5E\f\x87\xda\n\xd9F\xde\x8c$3\x92\xe6e\xe4\xec\xad\x1c.\b\x06\xa76\x82F\xff\xff\xff\x7f\x00\x00\x00\x00\x9af\xaeM\xc4', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x98000003, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='autogroup\x00') socket$nl_audit(0x10, 0x3, 0x9) [ 297.352180] x_tables: duplicate underflow at hook 1 [ 297.365105] audit: type=1400 audit(1582774769.303:80): avc: denied { map } for pid=9357 comm="syz-executor.0" path=2F6D656D66643AA5450C87DA0AD946DE8C243392E665E4ECAD1C2E0806A7368246FFFFFF7F202864656C6574656429 dev="tmpfs" ino=36941 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 297.509384] x_tables: duplicate underflow at hook 1 03:39:29 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:29 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 297.635802] IPv6: ADDRCONF(NETDEV_UP): bridge2: link is not ready [ 297.642941] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jqfmt" is only correct [ 297.642941] [ 297.743857] device vxlan0 entered promiscuous mode 03:39:29 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) dup2(0xffffffffffffffff, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:29 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:30 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) dup2(0xffffffffffffffff, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 298.446344] REISERFS warning (device loop3): super-6505 reiserfs_getopt: head of option "jqfmt" is only correct [ 298.446344] 03:39:30 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd17, 0xfffffffffffffff8}, 0x4b822, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0xc000000, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000040)={r0, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x4) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x200002, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x100000000, 0x109400) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000280)) 03:39:30 executing program 1: socket$inet6(0xa, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="2600000013003ff1eb14c1f8030322ff000c00e313000000093903680000000006000300124b", 0x26) 03:39:30 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:30 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) dup2(0xffffffffffffffff, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:30 executing program 3: socket(0x10, 0x3, 0x0) 03:39:30 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000180)='\xa5E\f\x87\xda\n\xd9F\xde\x8c$3\x92\xe6e\xe4\xec\xad\x1c.\b\x06\xa76\x82F\xff\xff\xff\x7f\x00\x00\x00\x00\x9af\xaeM\xc4', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x98000003, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='autogroup\x00') socket$nl_audit(0x10, 0x3, 0x9) 03:39:30 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f0000000040)) move_pages(0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 298.768856] x_tables: duplicate underflow at hook 1 03:39:30 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000180)='\xa5E\f\x87\xda\n\xd9F\xde\x8c$3\x92\xe6e\xe4\xec\xad\x1c.\b\x06\xa76\x82F\xff\xff\xff\x7f\x00\x00\x00\x00\x9af\xaeM\xc4', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, 0x98000003, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='autogroup\x00') socket$nl_audit(0x10, 0x3, 0x9) [ 298.802938] K: renamed from caif0 03:39:30 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 298.839109] device K entered promiscuous mode [ 298.853955] A link change request failed with some changes committed already. Interface K may have been left with an inconsistent configuration, please check. 03:39:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) pipe(0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000002000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001fc0)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r3, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) sched_setscheduler(0x0, 0x0, &(0x7f0000000380)) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r8 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r8, 0x0, 0x0, 0x2000002) r9 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x10000) write$RDMA_USER_CM_CMD_CONNECT(r9, &(0x7f0000000580)={0x6, 0x118, 0xfa00, {{0x10000, 0x2, "62e54548838b64527e68bcec30553e295469939bd91e7b9c305b9123bbc72d4e8107f60dcf15a33d3eaee8f06d87d6f583e7fd26d57c3a02066c2e826881da50d01dfe298182a95dffd227f61f50376e93609c9fba41ada12ea506b6924503f489aa27ad13e940f11f86de1fcd0703382039277c60274c40c41d44e6eb98a7e6de8e8d130b255a34c0faead06566c5941ef628856de4544f5d260a6b059c30ae3ce063928ea65e9dbfe3e96632a809c391a060f4ebb03c783af2e3e9591966d6d4d7f51e082ddc2532856ebc38fae39d8cb6a3dc80fc093b832b26815e724044d1edd869da4228596054578c39a4a529bd287c1c00419b86bc5379f17e70c7d3", 0x81, 0x1, 0x1f, 0x81, 0xf9, 0x40, 0x20}, r2}}, 0x120) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x10, r7}) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000002000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001fc0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r10, &(0x7f0000002040)={0x7, 0x8, 0xfa00, {r11}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r11}}, 0x18) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) [ 298.925867] x_tables: duplicate underflow at hook 1 03:39:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x191042, 0x0) getsockname(r1, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x80) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000200)={{0x0, 0x7}, 'port0\x00', 0x20, 0x0, 0x6, 0x20000040, 0x3, 0x101, 0x10001, 0x0, 0x2, 0x9}) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2b00000022008151e00f80ecdb4cb90404486516370011002f000000600020140e000a0002009d0edc2976", 0x2b}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') fchmod(r3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r6 = dup2(r4, r5) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, r7, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa}]}, 0x20}, 0x1, 0x0, 0x0, 0x24008000}, 0x48d0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_HAS_DEVICE_ATTR(r6, 0x4018aee3, &(0x7f0000000380)={0x0, 0xaf, 0x100, &(0x7f0000000340)=0x5}) ioctl$int_in(r3, 0x5452, &(0x7f0000000040)=0x100000000) 03:39:30 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 299.074359] netlink: 23 bytes leftover after parsing attributes in process `syz-executor.3'. [ 299.095444] overlayfs: filesystem on './file0' not supported as upperdir [ 299.182323] audit: type=1400 audit(1582774771.113:81): avc: denied { setattr } for pid=9473 comm="syz-executor.3" name="comm" dev="proc" ino=38115 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 03:39:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl(r4, 0x40, &(0x7f0000000180)="2a77af31b0da40bbc734b31d65661e554b9c9b453c19d4dd1dcc4c5b164d79a41c7ef69f30456986a35bb4e051434e35aebede7006fe25ee8eef0412897aea9bdc9ef7bc66ae3ffd06a9fc1c81774084d7a3e2728a24a54e006512dac5bf9482a50979248611c23a8f8774f3c0abfe23c1350f1d75a00ba74483690efff806198737dfa7bb21d53a0fa229d389020ae423014cc8af8ec7b539987dfa51560d4f86010e468e53a1f934618ef627") r5 = accept$alg(r3, 0x0, 0x0) r6 = dup(r5) write$UHID_DESTROY(r6, &(0x7f0000000080), 0xfff2) recvmmsg(r6, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000007280)=""/102400, 0x19000}], 0x1}}], 0x2, 0x0, 0x0) 03:39:31 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$SNDCTL_DSP_RESET(0xffffffffffffffff, 0x5000, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000040)={0x3, 0x0, [{}, {}, {}]}) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="018071c20000000180c200001f08003700001c0000000000019078ac1e0001ac1414bb0300900600000000"], 0x0) 03:39:31 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:31 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:31 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000540)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f0000000140)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.stat\x00', 0x275a, 0x0) fremovexattr(r0, &(0x7f0000000080)=@known='trusted.overlay.metacopy\x00') [ 299.379475] netlink: 23 bytes leftover after parsing attributes in process `syz-executor.3'. 03:39:31 executing program 0: r0 = socket(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x68042, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x80000000, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e21}, 0x10) sendfile(r0, r1, 0x0, 0x10001) [ 299.566742] overlayfs: filesystem on './file0' not supported as upperdir 03:39:31 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c000200080001000600000017fd9d92f8257a6f0286ee78c4aef45c2e33eb27fbcd86d5b2aada6d612c853fd099752adda371adce67af29922822fcef800ea7397714f7ee07434d6046b041f6605db308b65f51afc05ac071c1542207d81d12d030f92bb38d14d19aebeb9db42cb7524e42367ab75be9843c8f02b97fcc72c18151a551c05a3e50c883c1f407b0abc1cdef3512d1f36a3c89b956fce7c724ca55977d100cd2ad21dc3196e95ec50e2807cf250f33b745308f7cc1"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x300, 0x0, 0x0, {0xa, 0x0, 0x0, r11}, [@IFLA_GROUP={0x8, 0x1b, 0x67}]}, 0x28}}, 0x0) 03:39:31 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x2, {0x0, 0x110, 0x4, 0x1}}) socket(0x10, 0x3, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x1, 0x4) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000004a00", 0x6) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 03:39:31 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:31 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newlink={0x4c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_IGMP_VERSION={0x5}, @IFLA_BR_MCAST_STARTUP_QUERY_CNT={0x8}, @IFLA_BR_VLAN_DEFAULT_PVID={0x6, 0x27, 0x343}]}}}]}, 0x4c}}, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x4000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000680)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}]}, 0x1c}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r6, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000642}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r3, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@GTPA_TID={0xc}, @GTPA_LINK={0x8, 0x1, r6}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x30040000) 03:39:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x40000}) r1 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) sendmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x8) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) r6 = socket$pptp(0x18, 0x1, 0x2) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r7, r6) ioctl$VIDIOC_ENUM_FREQ_BANDS(r7, 0xc0405665, &(0x7f0000000180)={0x6c000000, 0x1, 0x5, 0x800, 0x3, 0x980a, 0x6}) connect$packet(r2, &(0x7f0000000000)={0x11, 0x11, r5, 0x1, 0x7, 0x6, @broadcast}, 0x14) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r8, 0x84, 0x1c, 0x0, &(0x7f0000008ec0)) fadvise64(r8, 0x5, 0x7fff, 0x5) pipe(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x10000, 0x0) ioctl$HCIINQUIRY(r9, 0x800448f0, &(0x7f0000000100)={0x0, 0x0, '\x00', 0x0, 0xb0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@local, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000005c0)=0xe8) socket$netlink(0x10, 0x3, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FITRIM(r10, 0xc0185879, &(0x7f0000000100)={0x0, 0x80000000}) [ 299.832838] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:39:31 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:32 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 300.031164] IPv6: ADDRCONF(NETDEV_UP): bridge1: link is not ready [ 300.048085] 8021q: adding VLAN 0 to HW filter on device bond1 [ 300.058335] bond0: Enslaving bond1 as an active interface with an up link 03:39:32 executing program 2: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffdfffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) writev(r3, &(0x7f0000001640)=[{&(0x7f0000000040)="e1", 0x1}], 0x1) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000180)=0x9) [ 300.107926] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:39:32 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_TTL={0x5, 0x4, 0x16}]}}}]}, 0x38}}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fcntl$setpipe(r1, 0x407, 0xb45) 03:39:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x3d, 0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f00000006c0)={{0x2, 0x4e24, @local}, {}, 0x0, {0x2, 0x0, @local}, 'veth1_to_hsr\x00'}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = socket$pptp(0x18, 0x1, 0x2) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r5, r4) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f0000000180)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6], 0x0, 0xb04}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xbc080, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:39:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x40000}) r1 = socket$packet(0x11, 0x0, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) sendmsg(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x8) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) r6 = socket$pptp(0x18, 0x1, 0x2) r7 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r7, r6) ioctl$VIDIOC_ENUM_FREQ_BANDS(r7, 0xc0405665, &(0x7f0000000180)={0x6c000000, 0x1, 0x5, 0x800, 0x3, 0x980a, 0x6}) connect$packet(r2, &(0x7f0000000000)={0x11, 0x11, r5, 0x1, 0x7, 0x6, @broadcast}, 0x14) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r8, 0x84, 0x1c, 0x0, &(0x7f0000008ec0)) fadvise64(r8, 0x5, 0x7fff, 0x5) pipe(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) r9 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x10000, 0x0) ioctl$HCIINQUIRY(r9, 0x800448f0, &(0x7f0000000100)={0x0, 0x0, '\x00', 0x0, 0xb0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@local, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000005c0)=0xe8) socket$netlink(0x10, 0x3, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FITRIM(r10, 0xc0185879, &(0x7f0000000100)={0x0, 0x80000000}) 03:39:32 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:32 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = getpgrp(r0) setpriority(0x0, r1, 0xffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) geteuid() accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) fcntl$lock(0xffffffffffffffff, 0x26, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) ptrace$getenv(0x4201, r4, 0xba, 0x0) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x6, 0xa81) r5 = socket(0x1000000010, 0x80003, 0x0) write(r5, &(0x7f0000000000)="220000002100070777d000000900070102000009000000000020000305001380", 0x20) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000040)={0x0, 'batadv0\x00', {}, 0x3f}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000240)={0xffffffffffffffff}) syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0xfffffffd, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000540)) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = accept$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000780)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) stat(&(0x7f00000004c0)='./file0\x00', 0x0) r11 = socket$alg(0x26, 0x5, 0x0) r12 = socket$alg(0x26, 0x5, 0x0) fcntl$dupfd(r11, 0x0, r12) r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, 0x0, 0x20000102000007) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@empty, 0x2c}) socket(0x0, 0x0, 0x5) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000180)) memfd_create(0x0, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000004, 0x810, 0xffffffffffffffff, 0xffffc000) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x1e, 0x10, 0xffffffffffffffff, 0x0) 03:39:32 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:32 executing program 1: r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000000)="9000000019001fb2b9409ac00ac9a37b8020780200110005040000067400030003000000000068d0bf46d323456536006466fcb7bd1ef5b269766436c0c80cef98d28581d158ba86c9d2896c6d3bca2d0000000b0015009e4fa6520641260180fffff32281d4bfdbf07725a90a7f1d889c0f1efbee9aa241731ae9e0b390b6cf80bb944cdd00"/144, 0x90, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x80000001, @empty}, 0x1c) 03:39:32 executing program 2: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x40080, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000040)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 03:39:32 executing program 1: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getsig(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0xffff}, 0x320, 0x0, 0x0, 0x0, 0x0, 0xb1e6}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ustat(0x0, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000340)={0x0, 0x1, [0x0, 0x26, 0x20, 0xf68, 0x1, 0xfffffffe, 0x9, 0x9]}) pipe2$9p(0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000001c0)) r4 = socket$l2tp(0x2, 0x2, 0x73) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000140)={0xe, {0x4, 0x5, 0x7b, 0x64, "c2ccb53aeff779df83220fa3e457d5072ccf5f507d558ef0831571a1de1036a34b1336a76799680b074173693b1ea6e6b723ab639360c5d4f4c95d106060a2ea67e8e3aea668b03e148dc1cda9e7678b1635141dba64c04b25f9006565dfbcacb0ddb6c4"}}, 0x70) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r5, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) lseek(r4, 0x6, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000040)='illinois\x00', 0x9) sendto$inet(r5, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe83, 0x11, 0x0, 0x27) syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') setsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f00000002c0), 0x4) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r6, &(0x7f0000000400)=ANY=[@ANYBLOB="848190a9e21d688a8550afb73063723c183d463350c98f19b90fe86ae700752b8cbc"], 0x1) fallocate(r6, 0x3, 0x0, 0x8020003) writev(r6, &(0x7f0000000380)=[{&(0x7f0000000200)="e5", 0x1}], 0x1) lseek(r6, 0x0, 0x3) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000080)) getxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)=@known='trusted.overlay.redirect\x00', &(0x7f0000000440)=""/115, 0x73) 03:39:32 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x800) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x88, 0x0, 0xa33, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x400}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3d}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xe5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x429}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}]}, @TIPC_NLA_PUBL={0x4}, @TIPC_NLA_MEDIA={0x24, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x19d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r4, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x29}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8001}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e24}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x60}}, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x8) r5 = socket$pptp(0x18, 0x1, 0x2) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r6, r5) ioctl$DRM_IOCTL_VERSION(r6, 0xc0406400, &(0x7f00000002c0)={0x2, 0x9, 0x5, 0xfc, &(0x7f0000000640)=""/252, 0x3f, &(0x7f0000000140)=""/63, 0xf8, &(0x7f0000000740)=""/248}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={0x0, 0x3f, "d7afc783907c32b82a99149ea8289a3a1d74aa0e71c71e2e46998969167413d2898f31d450f2507994af2c94ee1806ed967b37150de99e2190e40ae537151e"}, &(0x7f0000000080)=0x47) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000440)={r7, 0x4000, 0x66, "2e6d39ab9e762b957676704c6bfdfd0483d74109679289f856bd52bc3fb099350ea873bef03f5e26431e229f807d488cc75315f8572782a945ab84f67da1a14bf3735697927add6154df529eed574ec323f2b44d8aed48f45e152f232af1e63976cce97b3295"}, 0x6e) 03:39:32 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000004c0)="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", 0x1ea, 0x16}, {&(0x7f0000000040)="0be5a941", 0x4}]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xc8, r1, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xca}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x3e}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5a}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x180}, 0x240008d5) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$nfc_llcp(r3, &(0x7f0000002980)=[{&(0x7f0000000280)={0x27, 0x1, 0x2, 0x6, 0x1, 0x1, "2ab17b5c689dccd31f057e11e32246688b503fc0d318ed281dfd12441b6bf78d41378a4024b266dc7d814032155cc6f7407debd9517e1470e16406c2b27120", 0x3}, 0x60, &(0x7f0000000b40)=[{&(0x7f0000000300)}, {&(0x7f0000000340)="ea404b41ad4e03fa9c0161", 0xb}, {&(0x7f0000000380)='Bk', 0x2}, {&(0x7f00000003c0)="3d2b823d17c3da3bea64ea3b5672a1dcb5bd9d", 0x13}, {&(0x7f0000000400)="ce18c42d30ac655644204ed91d50e7c5b92de1ec53ea50805671067447a4278b2362b0c1731f2b2f623ba032a7cc1ac2916ee5720f6b3a39feb1b364cab3c4c83111bfa98cced99dee67da55d2279593aa2e182cb894ee249a8688e3a38e457b9fa741d40d5c41ed11b8fb36cddb628e69c6b489135d3e69b9c6ea8df5e18082f4b4dd52599bfabbe2306903c70ff2e1ba77ff54d838", 0x96}, {&(0x7f00000006c0)="b5ea1b9f86d5e540e4679175a4718ac2f0767665eb9be7cc5330bc2444952db3398cb2d270179450b0ba5768eb8ee4fd7e21fde1531fbd2aae925d0abab9df0a7be8fbd1600e1ead7fc19ec13ec358300ab9e670588dd4ea1b0f83326d0b15de5328dc2f8352c428db21a8e1fb799c7afd0e1774985314ab325408b4db98273d4168f7612ebc2045b1305d261048a5a4f59cbaef5eeda8c353a5a9e347d966db97ebc4bcd9af241302817008512f15533565a2afa1e1535ea5900a9df9b0c1065721472db5eb328c065774f1437c", 0xce}, {&(0x7f00000007c0)="72a7250bb8556d842c0e4a21413182a2605bd8664806f2caef1003b02eb656ac003736718d0c4c1d9eca8e2a95b2ce8c9991d554ce670cf62351a4ed00c7f3649adce5367f97063b3857b4d7c1ad30312bbbece0b152d13f13d807373ea1ca0cb2d8e38672e2c62f7420bb8d027d02d59a11d005c8d9bfaf268687bc361548a848bb1ad6df1f01d0c5292a127d832c49f8e2046d6ad1f055139dc56af84b3a91b9055a", 0xa3}, {&(0x7f0000000880)="da84a119e95ee753edf8127ff9d89e15c71c529d0b019e31aa11efba29c17daa366fb23cc131fb89f0e5a3ebbee9fbee0adc92a8eb4f57b87919c26d01d49d8a60fe676bac5fc4d1f109f303c5dd37b06b22d2c1b70350f4e255303e98147aa5606ef2aa5e41c4d3204c18b94b4d97dbb71e469f2d7551a46d23d40728f328d974d73dff", 0x84}, {&(0x7f0000000940)="2d680911cbeafb3abf1e0bc62b9967c88319a9e16cb96ae879962423dce693129b4d7c473d6b2bb21f3f480f45b4f6c4d2662c67f8964f6f1b1986c8263546a0f768b599a7b963096697a481cebcb648e4ad6bd96121c2e68250bf03ffbe358104ca33c3e742efbb200469613bce9b9c3f74a2c05dcd9f543625201137e15a98ab85c6438b767145153595dc0a047743e4d10ef6f4d31995c9c45a7a5d58c4e1a8ad920cc01b37df2a29f70e747a858a2c93aacc13434bbee50a1a60c515f664360ba2f6f2f15399c56582a7486725fb3ecf0020679b18f1e2e2bf2a879c4f2a8d364a4c926c5535bf", 0xe9}, {&(0x7f0000000a40)="18bba6e668c8bc06071838f55a2f5cc82ae706db2c3b58e791e1d8173bdcf5484551ab533d62cdabc16ccb4f9864af1664254929cfdb3af00f21a59d757fed9814206242573fbf236d4924801fa46b565a67f6284775c7883f5fdf5561e50996ccd664fcf6a469ecd01946705584366f0ff95168177047fdaeb6ef2af3797310a8ecbffc7569640fa91ec287c15b3cc016128f49cd71a05ead3d7ff2257638f8196f1ffc63b7379f2712e8540c44aab6979707f445ba6c20c6f99cf25578eae001198fd92950f54e2697fa", 0xcb}], 0xa, &(0x7f0000000c00)={0xe0, 0x10d, 0x7fffffff, "80ae1dae3b1db7252f0e429ec7c5a750a3b6d87449069b90a74f78e937e17f19403a2eb9ff355d35893a81d59e25057653e9ff6b2e09cc8d4ab730d74d6ba7c4f11326ff37c104b4793ebf5546fdc6e9667f62783a4361f4a5157d454656d0709ea37bbabb3770cd68753e0b240b7889239b4afde37298f756e43562a357796ebae0ff373eeb0a84cfb89a956b4acfb03388b8ca392209120bbf9164ffb634d7cc53058e604b620877c1d582c052b4b7189f69c0179c50f63bff5b49f1b1a27bd5d0e2c6096b82750dd662b0f9d899f5"}, 0xe0, 0x40087}, {&(0x7f0000000d00)={0x27, 0x0, 0x2, 0x1, 0x95, 0x0, "efd323387d5936e85a70d5e543cf4c55997fc7b9c8650a511ec2e9cb0d092510a007ea334af82dd65332d604f2137992b6fa6ae32f68aae620ad321429623c", 0x2}, 0x60, &(0x7f0000001dc0)=[{&(0x7f0000000d80)="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", 0x1000}, {&(0x7f0000001d80)="0494", 0x2}], 0x2, &(0x7f0000001e00)={0xf0, 0x111, 0xffff, "4c67eda6ef2f00d27972402e763c137443cc71d5c375a4859cce81d5d75f5863b5d6086e26368f050aca64afc5fb47a12c83bbf2af51843c9fb30d8f1b6fbe88c257aa134b5d75d42b5b715f51203cc3f0da775e64756f95a37149dc2203945bffa8ee08cd3aaef99b88eeb7225cb14450127ca89cabd08dbedc2077168e0c5ade258f5ee6899832a23d0fa026fa6b2125a449986fdeeb21bb2d706c665cc057c356e3bb2454b29cf0607a4711813ff24538c6dee9615c0225abf9cb9276b0a3e6ba3219e8a542547e6d15c525b9f023f9ccbf69327dc8017146368aa2ba"}, 0xf0}, {&(0x7f0000001f00)={0x27, 0x0, 0x1, 0x4, 0x9, 0x1, "68facdb875edeb56a6c55a027d211fab12335ee977c970b9e4dcfb2f225302f894a721ebbe65216bba92ae6b8c5d444385f8c0db379f59f538b596e5938542", 0xc}, 0x60, &(0x7f0000002040)=[{&(0x7f0000001f80)="e4a4fdaaf9f3a4f95cba", 0xa}, {&(0x7f0000001fc0)="e2622ff1345192b6b53c5d9b1223efee6116105aed27105fbb9cb1240797415db73970f777132a588c2e558f9d0b8d255d8f5fc4562c6901f24fd1cacaa8e6986e00c222b8a49652844e38e2a359ad", 0x4f}], 0x2, &(0x7f0000002080)={0x18, 0x1, 0x0, "6278196c65"}, 0x18, 0x4040080}, {&(0x7f00000020c0)={0x27, 0x1, 0x2, 0x7, 0x1, 0xf7, "5845f45b60ad35dcdccc336bdc0ecee1b8031115c97e55a37ab4760a07dfc853c6b81b808e73b3da853e7494923fe0e10e274bd56b6bf00250b292f03d5998", 0x31}, 0x60, &(0x7f00000027c0)=[{&(0x7f0000002140)="55f725ca99bb07619f9c7d33d241477def3e2d9fdebdfa40c20ee39795f7e294e70389455b919f4ce915f6c855a35d67706506fa81ae325f88c8758b2f97e5314c", 0x41}, {&(0x7f00000021c0)="92a5204a3d274768829d1fbd725acb8510e9483eee", 0x15}, {&(0x7f0000002200)="109cefe0c6eaf2c34afae416281dbac3ca712173d8e059435fc5974719c9432f05d961057667fe24272b0d2fb2c86501c3b74ea3089e90aa4a425e14b0b31cdd9959bc61ea6b6171884fc41c049d79682a64f75d82e85014033e73b413ecca0a547a981f7ed7389c783b0119b0134a253c561445ec1c0114197ee1fb7726807b4e73800881b782af0df8d20325d0c731479a039a4d8363daaecd917d53346d6249863c35aa781013d3ba874a40458b61cb369e57f2bb8b20c3bd3ca82d6e655eceb54de4c5", 0xc5}, {&(0x7f0000002300)="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", 0xfb}, {&(0x7f0000002400)="9c4323d5d306278312e01344c055c48dabffb472d4385949435a7c0ea6ab4121db450f7aa8c67cf6d042a48b6834baf96c6064d471b9e2e19563d8c5fd4b219a9d12f0f92be416bdaaaf1f959212a017ac8351473312db5300b134b28928f0140539285cf39e0f314055c1502316d90c891645d35a6083ac935bf1259113098aebb440f69671cdb877023d9177a1bd99e53ba94818cdf96b9b20482b3d75d3bdafa8ac2769418abe5fd6eb4cc0f67b4d18cc63e42dfb96a5ce8533f03d64d2c0", 0xc0}, {&(0x7f00000024c0)="af0a66e3ec1710c90c610a9f21f19d0929a63577a5727c137dfbb84b7186a391da607774c453e7817fdca5681951e59727a8167ff1adaef12620262b4f2013a55ae1c6fb429b5ebe41448e9767d5b6c205d04a2da8fe6153934d420d463db8f78676fa09217b8bf47fa8f42ea5fc8a13a0f7fcfbe95919c9e0c013adcb0c3f1bec1fb1fe6e43619a771cf006adbb60cf2da159537c1c78656d7a576ada1203d7fc2e", 0xa2}, {&(0x7f0000002580)="9199c34db4ca2228fc350c826cf86c022339cdb8b1831be6356f56592725a3ded08a17e64f06e582bfdc7e8570d6e8aa95c51760f360ae622c322ef916883615a86b158918c835b1536c4f6120a3b98adb519191c0c68510e4b9c73b9f6403c2ff0ee5f979533af55b9ec8d5557b76638b89cbf86e2f6acae0f177e892490b8851afdac366c6a4a923c9f6aa476313803d7d349e1bd07ad5b89ecc79f40ab5004c3ce6df91e3ca81c6c2ee597467dc49", 0xb0}, {&(0x7f0000002640)="c043d4d5eb2e9f4846c95adf1062bffb22735d57288853fc6a5dc0e5", 0x1c}, {&(0x7f0000002680)="0a18ff71", 0x4}, {&(0x7f00000026c0)="b07d16331e9f5660e71b7134d7974735650831d4182720d670603cf282b1a3f0de36a233c8dc665c2fbd25c23fe515d9c676ac348814bf0a0da76af8f6ebfe6e0bafb549e8ee3c45c7c436ed6c7d88469944c7120a063942a84f143270a18294afd5aa6a87949259b55ba97394775be67e7a620bf2dc37c6dc1d9fb109dc3beb7cc943ff30d5f9df9da2b4a799d30f27298d219b2210971df133760c82de26aa9c955f472234ee65c91a439a2bc85005893a8fb68cb4a7a899db17393a835452cff15fecd121735629caf594961e93a21b82f9758bb084867f2c234364a392fe6872f8c05854f3591e657ecae2f6c68938c9ef7b4100528d753df6dbbe", 0xfd}], 0xa, &(0x7f0000002880)={0xf8, 0x104, 0x8001, "bd688b82f794d8262cb3104c05510e3c985f26b75adbc0e9f7cf5ac37f95b2a4ca8ae9865ab2e306ec6170dbc7b0c30b67d08522ced14deca63ea9904bff8d505e279be78881aca7b144d247560ea885499a3789c86186637911794a9adc206c05391d5ce363dc7703be03b10bbe22d601dd6e8a5ebe7aa82d88a26ed08929d269d332d971f7ff363b6b33f833ac555338c37f097e7d83b4473e00e02134d8827df2049d03282206362fcdc9b47c290ea3488ef58334835018eda15c12be22f4e06eebd7c1a1301203a65bfdc4e8ba8abc1aa7034c6957225d784db0926b79a5767e59ff31c7"}, 0xf8, 0x80c4}], 0x4, 0x20000080) 03:39:32 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 300.993861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9639 comm=syz-executor.0 [ 301.047867] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 301.100160] Dev loop2 SGI disklabel: csum bad, label corrupted [ 301.154090] Dev loop2: unable to read RDB block 1 03:39:33 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 301.180952] loop2: unable to read partition table [ 301.189446] IPv6: ADDRCONF(NETDEV_UP): bond1: link is not ready [ 301.222722] loop2: partition table beyond EOD, truncated [ 301.237989] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 301.260777] 8021q: adding VLAN 0 to HW filter on device bond1 [ 301.291598] bond1: The slave device specified does not support setting the MAC address 03:39:33 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r4, 0xc0a85322, &(0x7f0000000600)) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 301.435616] Dev loop2 SGI disklabel: csum bad, label corrupted [ 301.441837] Dev loop2: unable to read RDB block 1 [ 301.446932] loop2: unable to read partition table [ 301.452997] loop2: partition table beyond EOD, truncated [ 301.460432] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 03:39:33 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r1, 0x0, 0x0, 0x7ffe) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r6, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000240)={0x0, r6}) sendfile(r0, r4, 0x0, 0x8400fffffffb) [ 301.650730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9639 comm=syz-executor.0 [ 301.670111] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 301.776933] bond1: The slave device specified does not support setting the MAC address [ 301.816407] audit: type=1804 audit(1582774773.753:82): pid=9690 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir722999696/syzkaller.4ejVmz/37/bus" dev="sda1" ino=16657 res=1 [ 301.856573] audit: type=1804 audit(1582774773.783:83): pid=9690 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir722999696/syzkaller.4ejVmz/37/bus" dev="sda1" ino=16657 res=1 03:39:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 301.918494] audit: type=1804 audit(1582774773.823:84): pid=9696 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir722999696/syzkaller.4ejVmz/37/bus" dev="sda1" ino=16657 res=1 03:39:33 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000000c0)={0x980000, 0x7, 0x831, r5, 0x0, &(0x7f0000000080)={0x9a0912, 0x8, [], @p_u32=&(0x7f0000000000)=0x32}}) sendmsg$RDMA_NLDEV_CMD_RES_GET(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x1409, 0x100, 0x70bd2b, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040880}, 0xc851) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @broadcast, @void, {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @remote, @remote, @dev, @remote}}}}, 0x0) 03:39:33 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x800) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x88, 0x0, 0xa33, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xffffffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x400}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3d}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xe5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x429}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}]}, @TIPC_NLA_PUBL={0x4}, @TIPC_NLA_MEDIA={0x24, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x19d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r4, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x50404}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x29}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8001}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1d}, @IFLA_IPTUN_ENCAP_DPORT={0x6, 0x12, 0x4e24}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x60}}, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), 0x8) r5 = socket$pptp(0x18, 0x1, 0x2) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r6, r5) ioctl$DRM_IOCTL_VERSION(r6, 0xc0406400, &(0x7f00000002c0)={0x2, 0x9, 0x5, 0xfc, &(0x7f0000000640)=""/252, 0x3f, &(0x7f0000000140)=""/63, 0xf8, &(0x7f0000000740)=""/248}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)={0x0, 0x3f, "d7afc783907c32b82a99149ea8289a3a1d74aa0e71c71e2e46998969167413d2898f31d450f2507994af2c94ee1806ed967b37150de99e2190e40ae537151e"}, &(0x7f0000000080)=0x47) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000440)={r7, 0x4000, 0x66, "2e6d39ab9e762b957676704c6bfdfd0483d74109679289f856bd52bc3fb099350ea873bef03f5e26431e229f807d488cc75315f8572782a945ab84f67da1a14bf3735697927add6154df529eed574ec323f2b44d8aed48f45e152f232af1e63976cce97b3295"}, 0x6e) 03:39:33 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400401, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd}) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x5b}) socket$packet(0x11, 0x0, 0x300) [ 301.954358] audit: type=1804 audit(1582774773.823:85): pid=9690 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir722999696/syzkaller.4ejVmz/37/bus" dev="sda1" ino=16657 res=1 03:39:33 executing program 1: socket$netlink(0x10, 0x3, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x501a00, 0x0) ioctl$SNDRV_PCM_IOCTL_PAUSE(0xffffffffffffffff, 0x40044145, &(0x7f0000000080)=0x4) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000140)={0x0, 0x3f, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x9a0914, 0x1ff, [], @p_u8=&(0x7f0000000040)=0x7}}) r3 = openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = socket(0x15, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) r5 = socket(0x15, 0x80005, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, 0x0, 0x0) accept$alg(r5, 0x0, 0x0) r6 = socket(0x15, 0x80005, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) r7 = socket(0x15, 0x0, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000a40)) r8 = socket(0x15, 0x80005, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) socket(0x15, 0x80005, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0x15, 0x80005, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) socket$inet6_udp(0xa, 0x2, 0x0) r9 = socket(0x15, 0x0, 0x0) sendto$inet6(r9, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) ioctl$NS_GET_OWNER_UID(r2, 0xb704, 0x0) getgid() r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r13) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000300)={{0x0, 0x0, 0x0, 0x0, 0x0, 0xd8}, 0x0, 0x9}) getuid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000003bc0)) socket(0x15, 0x80005, 0x0) socket(0x0, 0x80005, 0x0) r14 = getpid() sched_setscheduler(r14, 0x5, &(0x7f0000000380)) getpid() r15 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r16 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_IPV6_IPSEC_POLICY(r16, 0x29, 0x22, &(0x7f0000004380)={{{@in6=@local, @in6=@empty}}, {{@in=@remote}}}, &(0x7f0000004480)=0xe8) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) r17 = getpid() sched_setscheduler(r17, 0x5, &(0x7f0000000380)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) statx(0xffffffffffffffff, &(0x7f00000049c0)='./file1\x00', 0x0, 0x202, 0x0) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="a61e2b4b14906fb3da59bafe00acf64c661c5b8ff498d8fdcbd6b89c6e6b9aee5b2ad35eb1f310327263b2b964fd311e4fee8400000000e70900e712331a5b8420519f4077d0ec0a7ea8801e819a8066105fb6c7c1a4e450395b7cb74287ed3c8bf62df596ca66a3a239218770deed6d65cae5c188ed6d5b1bb2e90701e5187d4cdd19"], 0x6) 03:39:34 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:34 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) write$P9_RSTATu(r0, &(0x7f0000000180)={0xff, 0x7d, 0x0, {{0x500, 0xe0, 0x500, 0x4fffffe, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodev{evbox%\x00'/31, 0x1e, 'p\x02\x00}\xfag>\xff\xeb\t\xb55\x1f[\xde1@\x00\x00\x00\x00\x18{\x82\xd9\xb5\x00\x00+Y', 0xb, 'cgro\x98ppppP\x97', 0x65, '\xf8\xf6i\xfbqm\xcf1^\xc2\xf3\x85@\x9a\xc6[\x94\b\x039\xc0\x8c,;\x9e\x1dR\xc3l\xde{\xa4\xa4\x00\xb4\xb0\xb4\xf14\xa6f\xa8RH&\xb2\xb4\xa8\x8e\x01zwW\xb2\x06\xf8\xb0\x9aE\x1b4\a\xdb\xda\xb2\x88K\xaf\x05\x00\x00\x00\x00\x00\x00\x00G\xec!\xca\xbf\xf2\x0f\x9c\x1c\r\xbe6\xf4\xfd\x1aL\xc2\x80\xe8\xd4\x89\xdad\x9a7'}, 0xa, '/dev/nb{#\x00'}}, 0xff) 03:39:34 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) dup2(0xffffffffffffffff, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 302.315983] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9726 comm=syz-executor.0 [ 302.427097] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 03:39:34 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) recvfrom$l2tp6(0xffffffffffffffff, &(0x7f0000000080)=""/211, 0xd3, 0x12041, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, 0x20) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth0_to_hsr\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x45}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000200)={0x3000, 0x3000, 0x80, 0x80, 0xff}) 03:39:34 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 302.588323] audit: type=1400 audit(1582774774.523:86): avc: denied { ioctl } for pid=9746 comm="syz-executor.2" path="socket:[38745]" dev="sockfs" ino=38745 ioctlcmd=0x8946 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 303.087381] IPv6: ADDRCONF(NETDEV_UP): bond2: link is not ready [ 303.093672] 8021q: adding VLAN 0 to HW filter on device bond2 [ 303.104359] bond2: The slave device specified does not support setting the MAC address 03:39:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:35 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) dup2(0xffffffffffffffff, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:35 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2040, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYRESHEX], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r9, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@local, @in6=@loopback, 0x4e21, 0x9, 0x4e22, 0x0, 0x2, 0x0, 0x80, 0x0, r9, r10}, {0x10000, 0x2, 0x9, 0xffff, 0x6, 0x7, 0x81, 0xfffffffffffff364}, {0x5, 0x2, 0x100, 0x380}, 0x2, 0x6e6bbb, 0x1, 0x0, 0x1, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d3, 0x33}, 0x2, @in6=@dev={0xfe, 0x80, [], 0xa}, 0x3503, 0x4, 0x2, 0x80, 0x20, 0x9, 0xffff}}, 0xe8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CONTROL(r11, 0xc0185500, &(0x7f0000000080)={0x23, 0x1, 0x8, 0x1002, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_GET_CAPABILITIES(r11, 0x8004551a, &(0x7f0000000340)) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:39:35 executing program 0: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000000300736630000011000000000000000064756d6d793000000000000000000000696662300000000000000000000000006c6f0000000000000000000000000000ffffffffffff000000000000ffffffffffff000000000000000070000000a8000000d8000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000ffffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000ffffffff00000000"]}, 0x210) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) 03:39:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvme-fabrics\x00', 0x149302, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0xc}]}, 0x1c}}, 0x4004) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) bind$bt_rfcomm(r5, &(0x7f0000000500)={0x1f, @fixed={[], 0x12}}, 0xa) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000380)={r2, r0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='syzkaller\x00'}, 0x10) 03:39:35 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:35 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) dup2(0xffffffffffffffff, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 303.445730] IPv6: ADDRCONF(NETDEV_UP): bridge1: link is not ready 03:39:35 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$inet6(0xa, 0x80003, 0x6b) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x2200, 0x0) write$6lowpan_enable(r4, &(0x7f0000000040)='0', 0x1) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) fcntl$getown(r3, 0x9) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x420, 0x280, 0x280, 0x280, 0x0, 0x280, 0x350, 0x350, 0x350, 0x350, 0x350, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00', {}, {}, 0x0, 0x0, 0x1}, 0x0, 0x250, 0x280, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x46, 0x0, 0x4, 0x0, 0x0, 0x5, 0xa6}, {0xffffffffffffffff}}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x480) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000300)=[{&(0x7f0000000100)="a1fb553721373d2f3ab443fa82be0a2b2e70554205dbb7e64714dc10c5caaccf882227208e0f4ad293ed95f6c24f", 0x2e, 0x3}, {&(0x7f0000000200)="45e246cd0b5b66c1ee95b7a131a02c882d0a4402ab32828dc08364b45f47ef2b28aea29bb80a8f8d0fc7f93aafc8fc5f677729c101654314e2b7f8f0f6d486fcfcf56cec1dba22e4c3de9e319e895751681c3f9aae6f042fd7786bac7fffe99332150afa1442785918db918cc57fd34561e795ef6d3d04525dbceb3170a7e5977d64a49aef444395d639a807ae48eac37ac743fffc3d", 0x96, 0x3}, {&(0x7f0000000140)="7fe58944a3bd5db66e08978316409875f75d02c68fc8db6253bf3089a3d89b859a1acfb8260d0477d0a152c57f40dc12fba074e23d76bd0e4ba4cb3bc64705c8277c628bdf38b85c48779e9a0e9036b16f0b1e22810167aef45504fa3f74428b3dfe1e462cdebe97e424ab99e299c57b2ef12bc6dd50e8b48743", 0x7a, 0x9}, {&(0x7f00000002c0)="d1f74023a1390ec772eaf92e5d6bf0159a8e2b754add2ca8522c454a6f7a0b1d54a83032", 0x24, 0x7}], 0x2204c, &(0x7f0000000380)={[{@test_dummy_encryption='test_dummy_encryption'}, {@data_flush='data_flush'}, {@inline_xattr_size={'inline_xattr_size', 0x3d, 0xfffffffffffffff7}}, {@background_gc_off='background_gc=off'}, {@nobarrier='nobarrier'}], [{@fowner_lt={'fowner<', r6}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ppp0vmnet1'}}, {@appraise_type='appraise_type=imasig'}]}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000980)=@raw={'raw\x00', 0x3c1, 0x3, 0x438, 0x0, 0x0, 0x298, 0x298, 0x0, 0x368, 0x368, 0x368, 0x368, 0x368, 0x3, 0x0, {[{{@ipv6={@rand_addr="009bc8f718a3c537244ffc2a4418a29e", @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x298, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'team_slave_1\x00', {0x0, 0x4, 0x0, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x498) 03:39:35 executing program 0: pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x800000000000a) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000004c0)=@nat={'nat\x00', 0x19, 0x1, 0x198, [0x20000580, 0x0, 0x0, 0x200005b0, 0x200005e0], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000000300736630000011000000000000000064756d6d793000000000000000000000696662300000000000000000000000006c6f0000000000000000000000000000ffffffffffff000000000000ffffffffffff000000000000000070000000a8000000d8000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000ffffffff0000000072656469726563740000000000000000000000000000000000000000000000000800000000000000ffffffff00000000"]}, 0x210) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) 03:39:35 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:35 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f00000002c0)={{0x2, 0x3, 0x0, 0x0, 0x6}, 0x3, 0x591, 'id1\x00', 'timer1\x00', 0x0, 0x8, 0x401, 0x6, 0x7}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$rxrpc(0x21, 0x2, 0xa) connect$rxrpc(r5, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x40, @mcast1}}, 0x24) sendmsg$inet(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@ip_tos_int={{0x18, 0x110}}], 0x18}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @empty}, @in=@local}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000040)=0xe8) [ 303.637455] x_tables: ip6_tables: CLASSIFY target: used from hooks PREROUTING, but only usable from FORWARD/OUTPUT/POSTROUTING 03:39:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 303.924183] [ 303.925853] ================================ [ 303.930262] WARNING: inconsistent lock state [ 303.934722] 4.19.106-syzkaller #0 Not tainted [ 303.940528] -------------------------------- [ 303.944942] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 303.951102] ksoftirqd/1/18 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 303.956638] 00000000af432938 (&(&local->client_conns_lock)->rlock){+.?.}, at: rxrpc_put_client_conn+0x666/0xc00 [ 303.967014] {SOFTIRQ-ON-W} state was registered at: [ 303.972076] _raw_spin_lock+0x2a/0x40 [ 303.975990] rxrpc_connect_call+0x301/0x4630 [ 303.980498] rxrpc_new_client_call+0x8c6/0x1850 [ 303.985523] rxrpc_do_sendmsg+0xf2e/0x1bc1 [ 303.989862] rxrpc_sendmsg+0x4a8/0x5b0 [ 303.993945] sock_sendmsg+0xcf/0x120 [ 303.997769] ___sys_sendmsg+0x803/0x920 [ 304.001834] __sys_sendmsg+0xec/0x1b0 [ 304.005842] do_syscall_64+0xf9/0x620 [ 304.009812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.015099] irq event stamp: 752604 [ 304.018739] hardirqs last enabled at (752604): [] _raw_spin_unlock_irqrestore+0x67/0xe0 [ 304.028666] hardirqs last disabled at (752603): [] _raw_spin_lock_irqsave+0x66/0xbf [ 304.038040] softirqs last enabled at (751964): [] __do_softirq+0x650/0x93c [ 304.046849] softirqs last disabled at (751969): [] run_ksoftirqd+0x89/0x100 [ 304.055522] [ 304.055522] other info that might help us debug this: [ 304.062192] Possible unsafe locking scenario: [ 304.062192] [ 304.068255] CPU0 [ 304.070838] ---- [ 304.073414] lock(&(&local->client_conns_lock)->rlock); [ 304.078986] [ 304.081739] lock(&(&local->client_conns_lock)->rlock); [ 304.087367] [ 304.087367] *** DEADLOCK *** [ 304.087367] [ 304.093438] 1 lock held by ksoftirqd/1/18: [ 304.097678] #0: 000000007dc6c666 (rcu_callback){....}, at: rcu_process_callbacks+0xbff/0x17f0 [ 304.106471] [ 304.106471] stack backtrace: [ 304.110981] CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 4.19.106-syzkaller #0 [ 304.118516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.127873] Call Trace: [ 304.130551] dump_stack+0x188/0x20d [ 304.134387] print_usage_bug.cold+0x327/0x425 [ 304.138893] mark_lock+0xc71/0x11b0 [ 304.142543] ? check_usage_backwards+0x340/0x340 [ 304.147312] __lock_acquire+0xc62/0x49c0 [ 304.151387] ? mark_held_locks+0xf0/0xf0 [ 304.155483] ? mark_held_locks+0xf0/0xf0 [ 304.159559] ? find_held_lock+0x2d/0x110 [ 304.163636] ? mark_held_locks+0xf0/0xf0 [ 304.167712] ? lock_downgrade+0x740/0x740 [ 304.171882] ? _raw_spin_unlock_irqrestore+0x67/0xe0 [ 304.177003] lock_acquire+0x170/0x400 [ 304.180814] ? rxrpc_put_client_conn+0x666/0xc00 [ 304.185579] _raw_spin_lock+0x2a/0x40 [ 304.189391] ? rxrpc_put_client_conn+0x666/0xc00 [ 304.194155] rxrpc_put_client_conn+0x666/0xc00 [ 304.198745] ? rxrpc_rcu_destroy_call+0xb6/0x1e0 [ 304.203513] rxrpc_rcu_destroy_call+0xb6/0x1e0 [ 304.208231] ? rxrpc_process_call.cold+0x18/0x18 [ 304.212993] rcu_process_callbacks+0xb2d/0x17f0 [ 304.217678] ? __rcu_read_unlock+0x160/0x160 03:39:35 executing program 0: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x200040, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000240)) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc4}, 0x20000001) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_nanosleep(0x2, 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, 0x0) 03:39:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x70, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x0, 0x4000}, [@IFLA_VFINFO_LIST={0x50, 0x16, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x81000000, 0x3}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x800, 0x6}}, @IFLA_VF_VLAN={0x10, 0x2, {0x0, 0x3c1, 0x20}}, @IFLA_VF_LINK_STATE={0xc, 0x5, {0x3ff, 0x80000001}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x1, 0x6}}]}]}]}, 0x70}}, 0x0) 03:39:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:36 executing program 1: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000500)={{{@in6, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0x10f) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r6 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000080)=r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) recvmmsg(r7, &(0x7f0000000200), 0x0, 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) getdents(r0, &(0x7f00000006c0)=""/4096, 0x1000) 03:39:36 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, 0xffffffffffffffff) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) fcntl$dupfd(r2, 0x0, r2) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 304.222114] __do_softirq+0x26c/0x93c [ 304.225941] ? takeover_tasklets+0x7a0/0x7a0 [ 304.230362] run_ksoftirqd+0x89/0x100 [ 304.234188] smpboot_thread_fn+0x653/0x9d0 [ 304.238441] ? __kthread_parkme+0x5b/0x1b0 [ 304.242702] ? sort_range+0x30/0x30 [ 304.251734] ? __kthread_parkme+0xfd/0x1b0 [ 304.255976] ? sort_range+0x30/0x30 [ 304.259636] kthread+0x34a/0x420 [ 304.263156] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 304.268715] ret_from_fork+0x24/0x30 03:39:36 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:36 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r3, 0x0) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001940)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000800)="4ad12853c91614408beae5685505ff5af029cf0c43586d0a90f5f63b72111d2ea7", 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket(0x10, 0x2, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001b40)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_GET(r6, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001bc0)={&(0x7f0000001b80)={0x14, r7, 0x1}, 0x14}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r7, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0xff}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x57}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4001}, 0x801) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000040)) 03:39:36 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:36 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, 0xffffffffffffffff) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:36 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)=0x0) r1 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x4cc], 0x10000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000380)={0xa30000, 0x0, 0x101, r6, 0x0, &(0x7f0000000300)={0x990001, 0x76e, [], @p_u32=&(0x7f00000002c0)=0xfffffffb}}) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x36, &(0x7f0000000480)) ptrace(0x10, r7) ptrace$getsig(0x2, r7, 0x0, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='fd/3\x00') perf_event_open(0x0, r0, 0xb, r8, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r13 = socket(0x27, 0x80000, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockname$llc(r10, &(0x7f0000000240)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000340)=0xfffffffffffffe67) r14 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r14, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r14, 0x0, 0x29, &(0x7f0000000900)=ANY=[], 0x0) dup2(r10, r14) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r15 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r17 = dup2(r15, r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) r18 = socket$pptp(0x18, 0x1, 0x2) r19 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r19, r18) write$RDMA_USER_CM_CMD_CREATE_ID(r19, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r17, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000200), 0x4, {0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x3a}, 0xfffffff8}, r20}}, 0x38) r21 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) execveat(r21, 0x0, 0x0, 0x0, 0x0) r22 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r22, 0xae01, 0x0) r23 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sysvipc/msg\x00', 0x0, 0x0) dup(r23) getpid() r24 = getpid() rt_tgsigqueueinfo(r24, r24, 0x16, &(0x7f00000000c0)) ptrace(0x10, r24) ptrace$getsig(0x2, r24, 0x0, 0x0) perf_event_open(0x0, r24, 0x0, 0xffffffffffffffff, 0x2) r25 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$sock_attach_bpf(r25, 0x1, 0x32, &(0x7f0000000000), 0x4) r26 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r26, 0xc0505350, &(0x7f0000000400)={{0xe1, 0x5}, {0xf8, 0x3f}, 0x4, 0x0, 0x27}) 03:39:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) fcntl$dupfd(r2, 0x0, r2) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 304.574827] audit: type=1804 audit(1582774776.513:87): pid=9854 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir906931129/syzkaller.AJRNEO/41/bus" dev="sda1" ino=16674 res=1 03:39:36 executing program 0: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x200040, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000240)) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmsg$SMC_PNETID_FLUSH(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc4}, 0x20000001) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_nanosleep(0x2, 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, 0x0) 03:39:36 executing program 2: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c5, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8000080000001}, 0x0, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:36 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, 0xffffffffffffffff) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:36 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 304.864887] team0: Device ipvlan1 failed to register rx_handler 03:39:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r6 = syz_open_dev$vcsu(&(0x7f0000002900)='/dev/vcsu#\x00', 0x6, 0x40140) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="0b0251a6fd80a51a380000000000"], 0x14}}, 0x0) sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000002a80)={&(0x7f0000002940)={0x10, 0x0, 0x0, 0x404c0006}, 0xc, &(0x7f0000002a40)={&(0x7f0000002980)={0x9c, r8, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond_slave_1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gretap0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syzkaller1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r11, @ANYBLOB="2d6db6fab13d3346cc3d11cf2524730f94142dcdfba0a0022f0c98f9f63d7fe05de8475b743c6b3eda4ca2792445665c5d66eff98c4cb3909a195ec73c68fd2b9f03d22c9172310bccec1d3d70c3e742dff9b3cbb1ec8d611984f487a81e0485ec8671c731f798e24757b6b4a5332af9b9ef6fa843dad12f127550cbde382672b1dded1ee3171ee97b31be60f9cc676828"], 0x3c}}, 0x0) r12 = creat(&(0x7f0000000240)='./file0\x00', 0x20) ioctl$KVM_SET_SREGS(r12, 0x4138ae84, &(0x7f0000000480)={{0x3000, 0x10000, 0x10, 0x1, 0x0, 0x7f, 0xc0, 0x0, 0x20, 0x4, 0x1, 0x6}, {0x1, 0x2000, 0x9, 0x1, 0x7f, 0x1, 0x9, 0x0, 0x40, 0x0, 0x4, 0x2}, {0xd000, 0x10000, 0x1, 0x3, 0xff, 0xdd, 0x40, 0x1, 0x5, 0xfe, 0x0, 0x9}, {0xc002, 0x100000, 0xd, 0xd0, 0xf7, 0x0, 0x7, 0x5c, 0x81, 0x5, 0x9, 0x4}, {0xd000, 0x6000, 0xf, 0x4, 0x1, 0x6, 0x10, 0x0, 0x3, 0x7f, 0x80, 0x7f}, {0x4000, 0x5000, 0x8, 0x8a, 0x5, 0x1f, 0x1f, 0x8, 0x4, 0xe7, 0x20, 0x1f}, {0x6000, 0x3000, 0x3, 0x80, 0x40, 0x3, 0x3f, 0x20, 0x1, 0x1, 0x5, 0xca}, {0x2, 0x100000, 0x8, 0xe3, 0x0, 0x1, 0x8, 0x7e, 0x1, 0x20, 0x7, 0x3f}, {0x100000, 0x5000}, {0x7005, 0x10000}, 0x0, 0x0, 0x2, 0x10040, 0xa, 0xc401, 0x1, [0x7fff, 0x2, 0xfffffffffffffffc, 0x1]}) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0xa00000, 0x5, 0x2, r13, 0x0, &(0x7f0000000000)={0x990a96, 0x2, [], @ptr=0x3}}) write$FUSE_NOTIFY_STORE(r14, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x0, 0xffffffff, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r16, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r17}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x40008d0) 03:39:36 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980), 0x10a9) 03:39:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) fcntl$dupfd(r2, 0x0, r2) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:37 executing program 5: syz_open_dev$vcsu(0x0, 0x7f, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 305.180174] device bridge2 entered promiscuous mode 03:39:37 executing program 5: syz_open_dev$vcsu(0x0, 0x7f, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:37 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980), 0x10a9) 03:39:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 305.212319] device bridge_slave_0 left promiscuous mode [ 305.241785] bridge0: port 1(bridge_slave_0) entered disabled state 03:39:37 executing program 5: syz_open_dev$vcsu(0x0, 0x7f, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 305.303895] bridge2: port 1(bridge_slave_0) entered blocking state [ 305.310421] bridge2: port 1(bridge_slave_0) entered disabled state [ 305.341129] device bridge_slave_0 entered promiscuous mode [ 305.362483] bridge2: port 1(bridge_slave_0) entered blocking state [ 305.368936] bridge2: port 1(bridge_slave_0) entered forwarding state [ 305.386230] team0: Device ipvlan1 failed to register rx_handler [ 305.589647] device bridge_slave_0 left promiscuous mode [ 305.597678] bridge2: port 1(bridge_slave_0) entered disabled state 03:39:37 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980), 0x10a9) 03:39:37 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000980), 0x10a9) 03:39:37 executing program 5: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 305.649416] bridge2: port 1(bridge_slave_0) entered blocking state [ 305.655963] bridge2: port 1(bridge_slave_0) entered disabled state [ 305.663971] device bridge_slave_0 entered promiscuous mode [ 305.670376] bridge2: port 1(bridge_slave_0) entered blocking state [ 305.676863] bridge2: port 1(bridge_slave_0) entered forwarding state [ 305.685492] device bridge_slave_0 left promiscuous mode [ 305.691177] bridge2: port 1(bridge_slave_0) entered disabled state 03:39:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r6 = syz_open_dev$vcsu(&(0x7f0000002900)='/dev/vcsu#\x00', 0x6, 0x40140) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="0b0251a6fd80a51a380000000000"], 0x14}}, 0x0) sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000002a80)={&(0x7f0000002940)={0x10, 0x0, 0x0, 0x404c0006}, 0xc, &(0x7f0000002a40)={&(0x7f0000002980)={0x9c, r8, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond_slave_1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gretap0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syzkaller1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r11, @ANYBLOB="2d6db6fab13d3346cc3d11cf2524730f94142dcdfba0a0022f0c98f9f63d7fe05de8475b743c6b3eda4ca2792445665c5d66eff98c4cb3909a195ec73c68fd2b9f03d22c9172310bccec1d3d70c3e742dff9b3cbb1ec8d611984f487a81e0485ec8671c731f798e24757b6b4a5332af9b9ef6fa843dad12f127550cbde382672b1dded1ee3171ee97b31be60f9cc676828"], 0x3c}}, 0x0) r12 = creat(&(0x7f0000000240)='./file0\x00', 0x20) ioctl$KVM_SET_SREGS(r12, 0x4138ae84, &(0x7f0000000480)={{0x3000, 0x10000, 0x10, 0x1, 0x0, 0x7f, 0xc0, 0x0, 0x20, 0x4, 0x1, 0x6}, {0x1, 0x2000, 0x9, 0x1, 0x7f, 0x1, 0x9, 0x0, 0x40, 0x0, 0x4, 0x2}, {0xd000, 0x10000, 0x1, 0x3, 0xff, 0xdd, 0x40, 0x1, 0x5, 0xfe, 0x0, 0x9}, {0xc002, 0x100000, 0xd, 0xd0, 0xf7, 0x0, 0x7, 0x5c, 0x81, 0x5, 0x9, 0x4}, {0xd000, 0x6000, 0xf, 0x4, 0x1, 0x6, 0x10, 0x0, 0x3, 0x7f, 0x80, 0x7f}, {0x4000, 0x5000, 0x8, 0x8a, 0x5, 0x1f, 0x1f, 0x8, 0x4, 0xe7, 0x20, 0x1f}, {0x6000, 0x3000, 0x3, 0x80, 0x40, 0x3, 0x3f, 0x20, 0x1, 0x1, 0x5, 0xca}, {0x2, 0x100000, 0x8, 0xe3, 0x0, 0x1, 0x8, 0x7e, 0x1, 0x20, 0x7, 0x3f}, {0x100000, 0x5000}, {0x7005, 0x10000}, 0x0, 0x0, 0x2, 0x10040, 0xa, 0xc401, 0x1, [0x7fff, 0x2, 0xfffffffffffffffc, 0x1]}) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0xa00000, 0x5, 0x2, r13, 0x0, &(0x7f0000000000)={0x990a96, 0x2, [], @ptr=0x3}}) write$FUSE_NOTIFY_STORE(r14, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x0, 0xffffffff, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r16, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r17}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x40008d0) 03:39:37 executing program 2: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c5, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8000080000001}, 0x0, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:37 executing program 5: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 305.814900] team0: Device ipvlan1 failed to register rx_handler 03:39:37 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r6 = syz_open_dev$vcsu(&(0x7f0000002900)='/dev/vcsu#\x00', 0x6, 0x40140) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="0b0251a6fd80a51a380000000000"], 0x14}}, 0x0) sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000002a80)={&(0x7f0000002940)={0x10, 0x0, 0x0, 0x404c0006}, 0xc, &(0x7f0000002a40)={&(0x7f0000002980)={0x9c, r8, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond_slave_1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gretap0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syzkaller1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r11, @ANYBLOB="2d6db6fab13d3346cc3d11cf2524730f94142dcdfba0a0022f0c98f9f63d7fe05de8475b743c6b3eda4ca2792445665c5d66eff98c4cb3909a195ec73c68fd2b9f03d22c9172310bccec1d3d70c3e742dff9b3cbb1ec8d611984f487a81e0485ec8671c731f798e24757b6b4a5332af9b9ef6fa843dad12f127550cbde382672b1dded1ee3171ee97b31be60f9cc676828"], 0x3c}}, 0x0) r12 = creat(&(0x7f0000000240)='./file0\x00', 0x20) ioctl$KVM_SET_SREGS(r12, 0x4138ae84, &(0x7f0000000480)={{0x3000, 0x10000, 0x10, 0x1, 0x0, 0x7f, 0xc0, 0x0, 0x20, 0x4, 0x1, 0x6}, {0x1, 0x2000, 0x9, 0x1, 0x7f, 0x1, 0x9, 0x0, 0x40, 0x0, 0x4, 0x2}, {0xd000, 0x10000, 0x1, 0x3, 0xff, 0xdd, 0x40, 0x1, 0x5, 0xfe, 0x0, 0x9}, {0xc002, 0x100000, 0xd, 0xd0, 0xf7, 0x0, 0x7, 0x5c, 0x81, 0x5, 0x9, 0x4}, {0xd000, 0x6000, 0xf, 0x4, 0x1, 0x6, 0x10, 0x0, 0x3, 0x7f, 0x80, 0x7f}, {0x4000, 0x5000, 0x8, 0x8a, 0x5, 0x1f, 0x1f, 0x8, 0x4, 0xe7, 0x20, 0x1f}, {0x6000, 0x3000, 0x3, 0x80, 0x40, 0x3, 0x3f, 0x20, 0x1, 0x1, 0x5, 0xca}, {0x2, 0x100000, 0x8, 0xe3, 0x0, 0x1, 0x8, 0x7e, 0x1, 0x20, 0x7, 0x3f}, {0x100000, 0x5000}, {0x7005, 0x10000}, 0x0, 0x0, 0x2, 0x10040, 0xa, 0xc401, 0x1, [0x7fff, 0x2, 0xfffffffffffffffc, 0x1]}) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0xa00000, 0x5, 0x2, r13, 0x0, &(0x7f0000000000)={0x990a96, 0x2, [], @ptr=0x3}}) write$FUSE_NOTIFY_STORE(r14, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x0, 0xffffffff, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r16, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r17}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x40008d0) 03:39:37 executing program 5: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) socket$unix(0x1, 0x2, 0x0) readahead(r0, 0x8001, 0x100000001) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:37 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:38 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 306.088063] device bridge3 entered promiscuous mode 03:39:38 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:38 executing program 2: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c5, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8000080000001}, 0x0, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) [ 306.158228] bridge3: port 1(bridge_slave_0) entered blocking state 03:39:38 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 306.204537] bridge3: port 1(bridge_slave_0) entered disabled state [ 306.218672] device bridge_slave_0 entered promiscuous mode [ 306.228962] bridge3: port 1(bridge_slave_0) entered blocking state [ 306.235527] bridge3: port 1(bridge_slave_0) entered forwarding state [ 306.308485] device bridge2 entered promiscuous mode [ 306.339236] device bridge_slave_0 left promiscuous mode [ 306.344957] bridge3: port 1(bridge_slave_0) entered disabled state 03:39:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYRES32=r5, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a8c1b6a238e3c4ad8aaf50c71a903efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83d56f554ff14196fa347774c415acdeb046e3cf870dd52c26f6c603b8f3e34d021af63b3cfa8316e16c38ca72e58c356fde87643e8b809318f8d222ce63317ded42fa3aa394ade7dfe439c6479605528726a068cdc76a22067b3534442da88bc90000000000000000000000000f6a0d707"], 0x34}}, 0x0) r6 = syz_open_dev$vcsu(&(0x7f0000002900)='/dev/vcsu#\x00', 0x6, 0x40140) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000280)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="0b0251a6fd80a51a380000000000"], 0x14}}, 0x0) sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000002a80)={&(0x7f0000002940)={0x10, 0x0, 0x0, 0x404c0006}, 0xc, &(0x7f0000002a40)={&(0x7f0000002980)={0x9c, r8, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond_slave_1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'gretap0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'syzkaller1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r11, @ANYBLOB="2d6db6fab13d3346cc3d11cf2524730f94142dcdfba0a0022f0c98f9f63d7fe05de8475b743c6b3eda4ca2792445665c5d66eff98c4cb3909a195ec73c68fd2b9f03d22c9172310bccec1d3d70c3e742dff9b3cbb1ec8d611984f487a81e0485ec8671c731f798e24757b6b4a5332af9b9ef6fa843dad12f127550cbde382672b1dded1ee3171ee97b31be60f9cc676828"], 0x3c}}, 0x0) r12 = creat(&(0x7f0000000240)='./file0\x00', 0x20) ioctl$KVM_SET_SREGS(r12, 0x4138ae84, &(0x7f0000000480)={{0x3000, 0x10000, 0x10, 0x1, 0x0, 0x7f, 0xc0, 0x0, 0x20, 0x4, 0x1, 0x6}, {0x1, 0x2000, 0x9, 0x1, 0x7f, 0x1, 0x9, 0x0, 0x40, 0x0, 0x4, 0x2}, {0xd000, 0x10000, 0x1, 0x3, 0xff, 0xdd, 0x40, 0x1, 0x5, 0xfe, 0x0, 0x9}, {0xc002, 0x100000, 0xd, 0xd0, 0xf7, 0x0, 0x7, 0x5c, 0x81, 0x5, 0x9, 0x4}, {0xd000, 0x6000, 0xf, 0x4, 0x1, 0x6, 0x10, 0x0, 0x3, 0x7f, 0x80, 0x7f}, {0x4000, 0x5000, 0x8, 0x8a, 0x5, 0x1f, 0x1f, 0x8, 0x4, 0xe7, 0x20, 0x1f}, {0x6000, 0x3000, 0x3, 0x80, 0x40, 0x3, 0x3f, 0x20, 0x1, 0x1, 0x5, 0xca}, {0x2, 0x100000, 0x8, 0xe3, 0x0, 0x1, 0x8, 0x7e, 0x1, 0x20, 0x7, 0x3f}, {0x100000, 0x5000}, {0x7005, 0x10000}, 0x0, 0x0, 0x2, 0x10040, 0xa, 0xc401, 0x1, [0x7fff, 0x2, 0xfffffffffffffffc, 0x1]}) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000040)={0xa00000, 0x5, 0x2, r13, 0x0, &(0x7f0000000000)={0x990a96, 0x2, [], @ptr=0x3}}) write$FUSE_NOTIFY_STORE(r14, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x0, 0xffffffff, 0x1, 0x0, [0x0]}}, 0x29) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r16, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r17}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x40008d0) 03:39:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:38 executing program 5: syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:38 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) [ 306.395603] device bridge_slave_0 left promiscuous mode [ 306.402469] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.447984] bridge2: port 1(bridge_slave_0) entered blocking state [ 306.475162] bridge2: port 1(bridge_slave_0) entered disabled state [ 306.523966] device bridge_slave_0 entered promiscuous mode [ 306.533525] bridge2: port 1(bridge_slave_0) entered blocking state [ 306.539963] bridge2: port 1(bridge_slave_0) entered forwarding state [ 306.556803] team0: Device ipvlan1 failed to register rx_handler [ 306.687459] device bridge_slave_0 left promiscuous mode [ 306.693645] bridge2: port 1(bridge_slave_0) entered disabled state [ 306.737752] device bridge4 entered promiscuous mode 03:39:38 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:38 executing program 5: syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:38 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:38 executing program 2: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c5, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8000080000001}, 0x0, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2c400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000100)={0xffc00000, 0x4, 0x9, 0x1100, 0x400, 0x73b, 0x4}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r1, 0x8000001) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) gettid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r2, &(0x7f0000000440)=ANY=[], 0x0) [ 306.825028] team0: Device ipvlan1 failed to register rx_handler 03:39:38 executing program 5: syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r1, r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:38 executing program 0: perf_event_open(&(0x7f00000010c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000300)=0x2000000000005ea, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f0000000540)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mreqsrc(r3, 0x0, 0x26, 0x0, &(0x7f0000000100)=0xfffffffffffffc89) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0xfe20) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000080)={0xff67, 0x73, 0x0, {{0x0, 0x0, 0x1}}}, 0x18) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4005ef3) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000240)) socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r8, 0x4068aea3, &(0x7f0000000140)={0x7b}) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x40000004, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x10000, 0x800}) ioctl$KVM_RUN(r8, 0xae80, 0x0) dup3(0xffffffffffffffff, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000d6cff0), 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r9, 0x4) 03:39:38 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:38 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:39 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:39 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:39 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:39 executing program 2: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c5, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8000080000001}, 0x0, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:39 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:39 executing program 2: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c5, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8000080000001}, 0x0, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2c400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000100)={0xffc00000, 0x4, 0x9, 0x1100, 0x400, 0x73b, 0x4}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r1, 0x8000001) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) gettid() ptrace$getenv(0x4201, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r2, &(0x7f0000000440)=ANY=[], 0x0) 03:39:39 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:39 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:39 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:39 executing program 2: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c5, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x8000080000001}, 0x0, 0x5, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:39 executing program 2: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:39 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:39 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:39 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:39 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 307.976815] team0: Device ipvlan1 failed to register rx_handler 03:39:40 executing program 1: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:40 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:40 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:40 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:40 executing program 2: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:40 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 308.289845] team0: Device ipvlan1 failed to register rx_handler 03:39:40 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:40 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:40 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b00"/62]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:40 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:40 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b00"/62]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 308.541143] team0: Device ipvlan1 failed to register rx_handler 03:39:40 executing program 1: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:40 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:40 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b00"/62]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:40 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:40 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 308.848086] team0: Device ipvlan1 failed to register rx_handler 03:39:40 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:40 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:40 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:41 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 309.108616] team0: Device ipvlan1 failed to register rx_handler 03:39:41 executing program 1: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:41 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:41 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b00"/63]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:41 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b00"/63]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:41 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:41 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:41 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b00"/63]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 309.403852] team0: Device ipvlan1 failed to register rx_handler 03:39:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:41 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:41 executing program 1: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:41 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r4, r3) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r2, &(0x7f0000000980), 0x10a9) 03:39:41 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689d"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:41 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYBLOB="8720"]) 03:39:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 03:39:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 03:39:41 executing program 4: syz_open_dev$vcsu(0x0, 0x7f, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:41 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689d"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:41 executing program 1: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 03:39:41 executing program 0: syz_mount_image$iso9660(&(0x7f0000000180)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:39:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:39:41 executing program 1: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 03:39:41 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b00"/63]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:41 executing program 4: syz_open_dev$vcsu(0x0, 0x7f, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:41 executing program 1: write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000080), 0xfff2) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:41 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:39:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x5e}, 0x0) 03:39:41 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b00"/63]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) [ 309.984038] ISOFS: Unable to identify CD-ROM format. [ 310.086316] team0: Device ipvlan1 failed to register rx_handler 03:39:42 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) 03:39:42 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b00"/63]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:42 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x5e}, 0x0) 03:39:42 executing program 4: syz_open_dev$vcsu(0x0, 0x7f, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x5e}, 0x0) 03:39:42 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x5e}, 0x0) 03:39:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:42 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:42 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:39:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x5e}, 0x0) 03:39:42 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x5e}, 0x0) 03:39:42 executing program 4: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) [ 310.492336] team0: Device ipvlan1 failed to register rx_handler 03:39:42 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x0, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:42 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x0, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:42 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:42 executing program 1: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:42 executing program 4: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r3, r2) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) write$UHID_INPUT(r1, &(0x7f0000000980), 0x10a9) 03:39:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x0, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x1, 0x5e}, 0x0) 03:39:42 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:42 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x4d6, 0x3c}, 0x0, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 03:39:42 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559"]) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300), 0x0) 03:39:42 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x7f, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b000000000000000000000000000000000000000000000000000000000041bb86c559ca689dca881fe365c639effb0000004caf4b98cd5dc7e7b50860db449be8ce6b518db500"/123]) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x25e, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x101000, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x0, 0x0) dup2(r2, r1) inotify_init1(0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000340)=0x2) 03:39:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x28, 0x13, 0x41d, 0x0, 0x0, {0x8}, [@IFLA_OPERSTATE={0x5, 0xa, 0x10}]}, 0x28}, 0x1, 0x5e}, 0x0) 03:39:42 executing program 4: ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000dd0a8fef1ceec93d363c5976679022b8cd7ab892aaaebd2c0e05d019cc84a3562b0000000000000000000000