[ 42.672325] audit: type=1800 audit(1556594397.715:29): pid=7699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 42.710984] audit: type=1800 audit(1556594397.715:30): pid=7699 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.205' (ECDSA) to the list of known hosts. 2019/04/30 03:20:06 fuzzer started syzkaller login: [ 51.878230] kauditd_printk_skb: 5 callbacks suppressed [ 51.878255] audit: type=1400 audit(1556594406.925:36): avc: denied { map } for pid=7880 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/04/30 03:20:09 dialing manager at 10.128.0.105:34515 2019/04/30 03:20:10 syscalls: 2450 2019/04/30 03:20:10 code coverage: enabled 2019/04/30 03:20:10 comparison tracing: enabled 2019/04/30 03:20:10 extra coverage: extra coverage is not supported by the kernel 2019/04/30 03:20:10 setuid sandbox: enabled 2019/04/30 03:20:10 namespace sandbox: enabled 2019/04/30 03:20:10 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/30 03:20:10 fault injection: enabled 2019/04/30 03:20:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/30 03:20:10 net packet injection: enabled 2019/04/30 03:20:10 net device setup: enabled 03:23:25 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x180) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x3, "752402"}, 0x4) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e22, 0x9, @rand_addr="603ab9a40c93c8ac85791deb1ece0767", 0x8}, @in6={0xa, 0x4e24, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}, 0xfffffffffffff000}, @in6={0xa, 0x4e23, 0x1, @remote, 0x40}], 0x64) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x0, 0xfff}, {0x401, 0xffffffff}]}, 0x14, 0x1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="c04b83fd1f44bbd8b234ad43bf665963501d41e71cb96318d71e9df8054e1355ffca7891818e9f648d771d22f142b89f143eddc14b3f39072950eb9bc502137f5a7d6d44433885b97832cbec50ca51faf9445f0388e2ad72c0be92f51f13016f178906c5e61484210dbe5af2e791381840e602f8e10aa029ac2785ebd54ff07c53898b90ee2009275c98d10d6d21bb18b204f061dc73be1eecc52b11e6d7dd9b460abe4540f2c2a4f77569a498c6ed74a934a7d49c9d6d56e59a5aed602abf8b2b92d63bed11383c4fd64bbb987de0e15a6585416dec3cbe", 0xd8, 0xffffffffffffffff) r4 = add_key$user(&(0x7f0000000580)='user\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)="24eb80294fe2904444de242d9381", 0xe, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000540)=[{&(0x7f0000000380)="99896695f9ed6a9e62961fc7879e0d76549b096372d1b4f273a41aa36d6f107c7c18cc0f7cb6cd79e4a73b970a9d71bae8cab4210819550f8a8cd689ebc895c339b78df29292e7290738be873f53e26a28d9f9ca89e1fd2b6825e0d224bf110f64d8984dfd1e83eef616d87320617333c12e8f8e164f8e626687800f2629e4b2d035886dc58a942f437167bcf7f1da96e3e8ee05634e7959eba27f74ee88b1c3e4b179fffef7f57e42cba5d3151406c64f096308b70e92da4747a1ec4c6b08c87cdbe1c51557a7a747a3e50c9ddb9a80e348bc2f482a68aa157f6bb7b117a79082fef78e30b13d1ff15e4eac65ab704cf28085e3756a", 0xf6}, {&(0x7f0000000480)="f55121ec7422110bba8ad85a8cc5280a3113be73e49410f4e78a5915e284e464f64a2aa7e384fd45e70bf54769c0d2d7f90c7ed605763c7e5cd4e81fa6e3dfcd1375dc09f02f93531fc3814a607a5dd0bbd5d3c0a220e04aa9b1c4e118a27b66398706ca9d7a18b85e646435ee6b16e04fb846e5412380e22c25d76f652695047d2fb0336be4705305ea68414bfcd222cce0e45f436bcbcf8a98a044e4278d349284bcbcc26a6c18728852", 0xab}], 0x2, r4) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000640)) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000680)=0x3) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)={0x0, r1, 0xc}, 0x14) connect$x25(r0, &(0x7f0000000700)={0x9, @null=' \x00'}, 0x12) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000780)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x20, r5, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x20000050) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000880)={0x100000001, 0xda, "e1c3ae3201b897a969dcb12a90941138f6f19e774af457366e7670013f5c813f0b359405cf4c62ee7599ba6ab03fabb14bb6051185000fa4d814ceb4c1c2d735eae1debbfbf326b6f6bd9f99ae3ca28d3dde0a3c3f15394ea426cc3b0827f382965a865ff855ccadf506a4835c7c2a332b0e2fc5f31ac4109f2c9345113c11349105d4c02b0080de9b3dca4ba672e89fac3dd9a61cb7ff85a1c6437a9916a46b104c3f05ab22bfc5ca429b41d8cb4fde1b042d0e2e189c47febdc64755fe302db66070fe111ba70ca95afe51eb8c9d1930d679f49a1464df06b5"}) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000980)=0x2) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000009c0)={0x101ff, 0x0, &(0x7f0000ffd000/0x1000)=nil}) truncate(&(0x7f0000000a00)='./file0\x00', 0x3) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000a40)) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000a80)={0x3, 0x9945, 0x7, 0x106}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000ac0)={0x5, 0x2, 0x877, 'queue0\x00', 0x3}) ioctl$KVM_SMI(r0, 0xaeb7) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000b80)={0x81, 0x1000, 0x80000001, 0x4, 0x7}) ioctl$KVM_NMI(r1, 0xae9a) r6 = getpid() ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000bc0)={[], 0x48f0, 0x4c9, 0xff, 0x3ff, 0x8, r6}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000c40)={0x0, 0x101, 0x30, 0x3, 0x100000000}, &(0x7f0000000c80)=0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000cc0)={r7, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}}}, &(0x7f0000000d80)=0x84) [ 250.284489] audit: type=1400 audit(1556594605.335:37): avc: denied { map } for pid=7896 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=65 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 250.374441] IPVS: ftp: loaded support on port[0] = 21 03:23:25 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000040)={0x10203, 0x3, 0xd000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) write$P9_RFSYNC(r0, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x1ff, 0x2, 0x3000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x3, 0x7ff, 0xffff}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f00000001c0)={0x240, r1, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_BEARER_PROP={0x4}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1950}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @remote, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x6, @ipv4={[], [], @rand_addr=0x1}, 0x7ba}}}}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe198}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7c755c8e}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x4}]}, 0x240}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000480)={0x7055}) link(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000540)={0x7}, 0x7) fcntl$addseals(r0, 0x409, 0xe) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x4e23, 0x7, @ipv4={[], [], @local}, 0x4}, 0x1c) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/capi/capi20ncci\x00', 0x618400, 0x0) write$P9_RREAD(r2, &(0x7f0000000600)={0xc, 0x75, 0x2, {0x1, "0e"}}, 0xc) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x40020}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)={0xa8, r1, 0x702, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x68, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f93}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x40}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xee86}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40}, 0x4040) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f00000007c0)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000001000)=0x19, 0x4) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000001040)={0x3f, 0x4, 0x3f, 0x1}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000001080)={0x0, @in6={{0xa, 0x4e24, 0x0, @mcast2, 0xfffffffffffffff9}}, [0x81, 0x10001, 0x26d, 0x1ff, 0x3, 0x1, 0x8d, 0x7, 0xfffffffffffff3e1, 0x6, 0x6, 0x7f, 0x8000, 0x401]}, &(0x7f0000001180)=0x100) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000011c0)=@assoc_id=r3, &(0x7f0000001200)=0x4) ioctl$VT_ACTIVATE(r2, 0x5606, 0x8001) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001240)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x10) open$dir(&(0x7f0000001280)='./file1\x00', 0x12080, 0x40) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000012c0)={0x0, 0x0, 0x4, 0x0, [], [{0x0, 0x6, 0xff, 0x0, 0x1000, 0x1}, {0x3, 0x9, 0x9, 0x40, 0x6, 0x7}], [[], [], [], []]}) syz_open_dev$sndctrl(&(0x7f0000001480)='/dev/snd/controlC#\x00', 0x1, 0x10000) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000014c0)=@assoc_value={r3, 0x7}, &(0x7f0000001500)=0x8) getsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000001540)=0x3e91, &(0x7f0000001580)=0x4) [ 250.486877] chnl_net:caif_netlink_parms(): no params data found [ 250.576598] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.583338] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.591111] device bridge_slave_0 entered promiscuous mode [ 250.617263] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.623808] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.643665] device bridge_slave_1 entered promiscuous mode [ 250.686239] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.696228] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.722303] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 250.726827] IPVS: ftp: loaded support on port[0] = 21 [ 250.732523] team0: Port device team_slave_0 added [ 250.740829] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.748752] team0: Port device team_slave_1 added [ 250.776528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 03:23:25 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'ip6gre0\x00', 0x1}) listen(r0, 0x8000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x1, 0x8, {0x56, 0x9, 0x5, {0x3, 0x6}, {0x101}, @ramp={0x20, 0x3, {0xffffffff, 0x1f, 0x8000, 0x9}}}, {0x55, 0x100000000, 0x0, {0x20, 0x6}, {0x8, 0x6}, @period={0x59, 0x4da, 0x7f, 0xa6, 0x7, {0x7f, 0x88f, 0x4000000000000, 0x7}, 0x1, &(0x7f00000000c0)=[0x948e]}}}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xc4, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1ff}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x59}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xe93}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1f}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x90}, 0x1) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000003c0)={0x8, "eda21138e446528ba5b92a37f87e4b1ff85363e7cc8318e7ad4456caf4f159dc", 0x4, 0x81, 0xffffffff, 0x5, 0x7}) ioctl$KDDISABIO(r0, 0x4b37) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f00000004c0)='irlan0\x00') ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000500)={0x7, 0x103, 0x1, {0x8, 0xffffffff, 0x3, 0x6b}}) write$9p(r0, &(0x7f0000000540)="b7f0725229325b86e45110c66408157007320bfec92f7d0911a620a292257b", 0x1f) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, r3, 0x6, 0x70bd2a, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4010) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000006c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000800)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) recvfrom(r1, &(0x7f0000000700)=""/243, 0xf3, 0x2020, &(0x7f0000000940)=@hci={0x1f, r4, 0x3}, 0x80) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000009c0)=""/125) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000a40)) getsockname$unix(r2, &(0x7f0000000a80)=@abs, &(0x7f0000000b00)=0x6e) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000c00)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x2c, r3, 0x4, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x10, 0x18, {0x7d57, @bearer=@l2={'eth', 0x3a, 'nr0\x00'}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) select(0x40, &(0x7f0000000c40)={0x400, 0x10001, 0x2, 0xffff, 0x3, 0x2, 0xffffffffffffed46, 0x101}, &(0x7f0000000c80)={0x1, 0xffffffff, 0x8a, 0x4, 0x393e7eee, 0x3f, 0x6, 0x2}, &(0x7f0000000cc0)={0xdc50, 0x7, 0x4d3, 0x7, 0x2, 0x3, 0x0, 0x4}, &(0x7f0000000d00)={0x0, 0x2710}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000d40)="5b76d8e8df3ddfa36e19de4739950f41db0c0059200f9112f29a0d", 0x1b) r5 = msgget(0x0, 0x472) msgrcv(r5, &(0x7f0000000d80)={0x0, ""/79}, 0x57, 0x1, 0x3800) write$P9_RFSYNC(r0, &(0x7f0000000e00)={0x7, 0x33, 0x1}, 0x7) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000f00)={&(0x7f0000000e40)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e80)={0x24, r3, 0x0, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x10000}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000f40)={'veth1_to_bridge\x00', {0x2, 0x4e23, @remote}}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000f80)={'bridge_slave_1\x00', {0x2, 0x4e21, @local}}) [ 250.784360] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.907024] device hsr_slave_0 entered promiscuous mode 03:23:26 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r0, 0x36) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x2, 0x2}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x200000000, 0x4) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f00000000c0), 0x4) getsockname(r1, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x80) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000001c0)={0x20, 0x5, 0x0, 0x5, 0xf800000000000000, 0x6}) sched_getaffinity(r0, 0x8, &(0x7f0000000240)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x41}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x120, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8000) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000003c0)={0x5, 0xcd, 0x9, 0x1, 0x5}) mount(&(0x7f0000000400)=@loop={'/dev/loop', 0x0}, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='nfs4\x00', 0x2000010, &(0x7f00000004c0)='TIPCv2\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @rand_addr=0xffffffffffffff81}}, 0x8, 0x4, 0xfffffffffffffffd, 0x9, 0x10}, &(0x7f00000005c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000600)={r3, 0x5}, 0xc) ioctl$TIOCSCTTY(r1, 0x540e, 0x1) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000640)={0x0, 0x3, 0x9, 0x0, 0x4}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000680)=0xff, 0x4) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f00000006c0)={0x0, @raw_data="aaa0e4619158b9ca42e32455486fd71620821b452dcd92cf07c9b5fb0ffeee34212c401bf30fd9ea4fa40cd19b4e541c646506562b57bc63486ee1398c8e99081bf196eba82183238066d79db5ab655adab347af0e3c3551b5ff634ce84b197df56452a786090bfff1d936287175348c223436e64d3681bec4d46c41d13396d432fae8d356755325776c56fae961051ca11f6d2f62ff938dc09b5499fe9d4ce8b8a03bc5e60f24b810acf1c157c034bda20bf0caa9e24f786791ae75f03093f224ea76f18cf060f2"}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000007c0)=0x2) getuid() write$P9_RXATTRWALK(r1, &(0x7f0000000800)={0xf, 0x1f, 0x2, 0x7}, 0xf) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000840)=0x37eaab5f) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000880)={r3, 0x8}, 0x8) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000008c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000900)={0x6, 0x3, 0x5, 0x480000000000, 0x1, 0x81}) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000980)={0x40000000, 0xb, "54fcdb6b08acd9376c4b18e5c109452dd3e8d51f1aa8561607d429ac1e12ef76", 0xe8, 0x2, 0xffffffffffffff34, 0xfffffffffffffffb, 0x9, 0x4, 0x100000001, 0x80000001, [0x50, 0x3, 0x8, 0x80]}) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000a80)={r3, 0x2, 0xf98, 0x7}, 0x10) write(r1, &(0x7f0000000ac0)="cbb94913ee9784a1ae48cc901d1775d774fae39b9aa26586b14a4d9fa41d0829919b1b363dca5019b75387e249fab42af1217880e5e4f6f319bcc5fc461d82a5df62be0d6b6138e07b31c88a4ec859cdc1fe5f4fee46fd9932625ce584fb41663756f9ec85c5224e36c9a98b14b2869f3415103b47deefefdbd4467dfd8e17d2b91ffac3bff5b3ff64facaa029d91a535f5af2d011ae52fe6e36293c7f0d5c6c332be60f6780d1af9fad6888457327", 0xaf) [ 250.963990] device hsr_slave_1 entered promiscuous mode [ 251.005876] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 251.046117] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 251.055424] IPVS: ftp: loaded support on port[0] = 21 03:23:26 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)={0xfffffffffffff4cf, 0x7ff, 0x1, 0x3, 0x1, [{0xf3, 0x9, 0x4, 0x0, 0x0, 0xa08}]}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000180)={0x85b, [0x3, 0x2, 0x0, 0x4, 0x1000, 0x8001, 0xf9, 0x0, 0x1, 0xfffffffffffffffd, 0x7, 0x5, 0x8, 0x8001, 0x6, 0x200, 0x8001, 0xd1, 0xaa4, 0x2, 0x2, 0x40000000000000, 0x100, 0x100, 0x5, 0x20, 0x7f, 0x9, 0x7fff, 0x9, 0x20, 0x5, 0x0, 0x80000000, 0x0, 0x2, 0xff, 0x1, 0x6, 0x6, 0x20, 0x1, 0x10001, 0x7cc1, 0x2, 0x5, 0x4, 0x4a0e800000], 0x1}) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000240)={0x0, 0x1000, 0x4, [], &(0x7f0000000200)=0x100}) prctl$PR_GET_NO_NEW_PRIVS(0x27) openat$cuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cuse\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(r1, 0x40345622, &(0x7f00000002c0)={0x6, "be83dc13e1c34c5821fe1b9f47db109bdc03154e844adea73a0ff8438fa11823", 0x1, 0x1}) setsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000000300)={@dev={0xac, 0x14, 0x14, 0x24}, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2}, 0xc) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)={0x258, r2, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb41}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA={0x14c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe72a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x83}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x504a49d5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x340}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x140c6c21}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5302}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb7c9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}]}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x250a}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x10}, 0x4) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000006c0)={0x0, @reserved}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f0000000780)='\x00', 0xffffffffffffffff}, 0x30) r5 = getpgrp(r3) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000800)={r0, 0x100000001, 0x7, "2816b1d3b07e0660353a60a1ee01f6ca0c383678e2d47b047e755ee8067e29a2cb230792f727d4534c4cf979bdf5796bb3dc6e23c3f0fdc43ba22cb6"}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000880), &(0x7f00000008c0)=0x4) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000900)={0x7, 0x0, [], {0x0, @bt={0x1000, 0x8a, 0x1, 0x1, 0x7, 0x8, 0x6, 0x0, 0xd4d, 0x6, 0x8, 0x9, 0x3, 0x7e5, 0xa, 0x21}}}) sched_getparam(r5, &(0x7f00000009c0)) bind$bt_l2cap(r1, &(0x7f0000000a00)={0x1f, 0x75, {0x40, 0x1f, 0x81, 0x3, 0xfffffffffffffffa, 0x1a}, 0x101, 0x1def}, 0xe) getsockname(r0, &(0x7f0000000a40)=@ethernet={0x0, @dev}, &(0x7f0000000ac0)=0x80) r6 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000) shmdt(r6) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b40)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000c40)=0xe8) sendmsg$nl_netfilter(r1, &(0x7f0000000e40)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x2040000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000c80)={0x144, 0x9, 0x6, 0x800, 0x70bd26, 0x25dfdbfb, {0x1, 0x0, 0x4}, [@nested={0x130, 0x49, [@typed={0xc, 0x5c, @u64=0x3}, @generic="3411e47a931553ed2774db2a1cbf30182e43f964d0a11d1b8f66c02513cfd8125091192f974ce0fb107d80f4", @typed={0x14, 0x6e, @ipv6=@rand_addr="4fa2e1e3faeb545f7d2440e83ae4d63c"}, @typed={0x8, 0x6c, @uid=r7}, @typed={0x8, 0x80, @fd=r4}, @typed={0x8, 0x5b, @u32=0xbc4}, @generic="589cdbd12965fd731e529e18f2a2eed8d4665437ac902e04cced3081e99516d737794d114844cf80e40de73f4ba7e10d667a10a1144848f050e8c2eb6e75c600e00040aa79de16cf4aa078ac0299499ff2bbca04e1c57767dfac6cbe5f7df4d81cb4728671c62ee9c2b822698d2ad32bb26b7bf362be0c052385cca5f1075de647f2c210eb64d8ee58615dcfaf674cef15df6a6349bdba1ee772513534dc3846c9d5014840c698386fffc9454b80fbbd48d83f30cc907c4e03a9e3d22601cfdb0367652ba90b4d7c"]}]}, 0x144}, 0x1, 0x0, 0x0, 0x4008040}, 0x4000000) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000e80)={0x1, 0x1, "821ae9928493a9772c5ffc72b7e66e7fb69aeed758b642b9b9b93900be60d886", 0x40, 0x8001, 0x2, 0x0, 0xcfac6dc269a88b14}) prctl$PR_GET_KEEPCAPS(0x7) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000f00)='/dev/cuse\x00', 0xa) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000f40)='ifb0\x00') [ 251.166722] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.173254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.180656] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.187104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.233476] chnl_net:caif_netlink_parms(): no params data found [ 251.302481] IPVS: ftp: loaded support on port[0] = 21 [ 251.417589] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 251.424230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.433772] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.440159] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.448918] device bridge_slave_0 entered promiscuous mode [ 251.462580] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.477610] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.485537] device bridge_slave_1 entered promiscuous mode [ 251.520638] IPVS: ftp: loaded support on port[0] = 21 03:23:26 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000040)={0x9, 0x32314d56, 0x3, @discrete={0x0, 0x8}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x11000, &(0x7f0000000580)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x9}}], [{@seclabel='seclabel'}, {@fowner_gt={'fowner>', r6}}, {@fowner_eq={'fowner', 0x3d, r7}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@dont_appraise='dont_appraise'}, {@dont_hash='dont_hash'}, {@appraise='appraise'}, {@seclabel='seclabel'}]}}) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000700)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x20, &(0x7f0000000740)="793071843aac2ae044409016e722db4eefc0a8ff541f022207784e7094554a8c53559124b7974054984cbea1c60640cf861cfb7aa3f33a75d7b2a2464b1a6dadd985f980e4a8b709be900801f7702f0dabb525fd893e9748f8c8834e6a9cea3b3d1cab02448b2f84e0a1842e481e4a512a9dab86b59d17167655b8f970afc99937ca7df882d8675ddcb86c15818e07784c510051d82ec10fabc4e8d54fea143244b9a2d6ced89a3060fc51d065e127e80d914982", 0xb4) ioctl$TCXONC(r0, 0x540a, 0x61) set_mempolicy(0x1, &(0x7f0000000800), 0xd) getsockopt$ARPT_SO_GET_INFO(r8, 0x0, 0x60, &(0x7f0000000840)={'filter\x00'}, &(0x7f00000008c0)=0x44) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=""/74}) write$apparmor_exec(r0, &(0x7f0000000a00)={'exec ', 'filter\x00'}, 0xc) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$PPPIOCSMRRU(r8, 0x4004743b, &(0x7f0000000a40)=0x9e26) readlinkat(r1, &(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)=""/25, 0x19) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000b80)={0x16, 0x98, 0xfa00, {&(0x7f0000000b40)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e20, @loopback}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000c40)={0x11, 0x10, 0xfa00, {&(0x7f0000000b00), r9}}, 0x18) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000c80)) modify_ldt$read_default(0x2, &(0x7f0000000cc0)=""/118, 0x76) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000d40)=0x3) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000d80)) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000dc0)=0x1) r10 = syz_genetlink_get_family_id$fou(&(0x7f0000000e40)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000f00)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e80)={0x34, r10, 0x4, 0x70bd2d, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x73}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 251.549002] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.567772] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.579949] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 251.594659] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.642235] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.662617] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.670611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.680914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.707965] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 251.715713] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.726067] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.747909] chnl_net:caif_netlink_parms(): no params data found [ 251.761317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 251.772835] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.781614] team0: Port device team_slave_0 added [ 251.807789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 251.816217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.824076] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.830563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.839857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.852220] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 251.860424] team0: Port device team_slave_1 added [ 251.867870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 251.872795] IPVS: ftp: loaded support on port[0] = 21 [ 251.892176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.900395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.908499] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.914899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.927927] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.936045] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 251.966820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.999662] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.007142] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.014394] device bridge_slave_0 entered promiscuous mode [ 252.029516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.096803] device hsr_slave_0 entered promiscuous mode [ 252.134031] device hsr_slave_1 entered promiscuous mode [ 252.204337] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.210746] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.218934] device bridge_slave_1 entered promiscuous mode [ 252.235182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.246541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 252.258016] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 252.265686] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 252.283833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 252.294305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 252.302537] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 252.312820] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 252.340584] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.348916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 252.356958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 252.366949] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 252.379879] chnl_net:caif_netlink_parms(): no params data found [ 252.399087] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.407148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 252.415033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.424573] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 252.477108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 252.485764] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.501386] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 252.510164] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 252.521090] chnl_net:caif_netlink_parms(): no params data found [ 252.536842] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.544546] team0: Port device team_slave_0 added [ 252.569050] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.577455] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.585656] device bridge_slave_0 entered promiscuous mode [ 252.597270] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.605686] team0: Port device team_slave_1 added [ 252.615925] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 252.627143] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.634632] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.642211] device bridge_slave_1 entered promiscuous mode [ 252.661424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.669022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 252.680209] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 252.761508] device hsr_slave_0 entered promiscuous mode [ 252.804124] device hsr_slave_1 entered promiscuous mode [ 252.878118] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 252.887117] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 252.908321] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.915496] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.922812] device bridge_slave_0 entered promiscuous mode [ 252.931238] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 252.944751] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 252.954980] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.990391] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.996912] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.004773] device bridge_slave_1 entered promiscuous mode [ 253.035487] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 253.045441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 253.074532] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.082196] team0: Port device team_slave_0 added [ 253.096357] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 253.104251] team0: Port device team_slave_0 added [ 253.110194] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 253.117878] team0: Port device team_slave_1 added [ 253.128101] audit: type=1400 audit(1556594608.175:38): avc: denied { associate } for pid=7897 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 253.154125] chnl_net:caif_netlink_parms(): no params data found [ 253.165260] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 253.173418] team0: Port device team_slave_1 added [ 253.179770] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.192264] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.199890] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 253.231757] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 253.252018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 03:23:28 executing program 0: setresgid(0x0, 0xee00, 0x0) clone(0x4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getegid() tkill(r0, 0x13) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) setresgid(r1, 0x0, 0x0) prlimit64(r0, 0x0, 0x0, 0x0) [ 253.259114] audit: type=1400 audit(1556594608.305:39): avc: denied { create } for pid=7919 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 253.291451] audit: type=1400 audit(1556594608.305:40): avc: denied { write } for pid=7919 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 253.319185] audit: type=1400 audit(1556594608.305:41): avc: denied { read } for pid=7919 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:23:28 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000005c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) clone(0x400, &(0x7f0000000080)="6a45333fd230dc6e00a535dcd7c6dc4221d5c7923de95cd7744b235adfd85fad47e11a84837d836f3d0a2190eb03a4efba905f223208de5dcc907fcf513a0f94f61209528da1ed39b9487fc97d8991f9fa8f97bb8a08893f028edfd3a9f9", &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000140)="9ebc75596ca5b481ab5de17e63e217a028db7ea1b4cd33130b1f2cd07e816d0f1b8f91364d22705884ee4aef426761b33d7709d5196ea204ac3b41356e2bda56fb738b45afe775e1dc22116d12d69dda0e3f113d691095250b622ad5") ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000040)={0x3000, 0x6000}) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x4c81, 0xfffffffffffffffe) fcntl$addseals(r0, 0x409, 0x8) [ 253.406905] device hsr_slave_0 entered promiscuous mode [ 253.443917] device hsr_slave_1 entered promiscuous mode [ 253.481360] hrtimer: interrupt took 66675 ns [ 253.536877] device hsr_slave_0 entered promiscuous mode [ 253.574015] device hsr_slave_1 entered promiscuous mode [ 253.622059] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.636777] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 253.674509] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 253.684537] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 253.700179] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.710166] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 253.764093] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.773391] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 253.787267] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.807322] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.816971] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.825523] device bridge_slave_0 entered promiscuous mode [ 253.832983] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.839527] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.847049] device bridge_slave_1 entered promiscuous mode [ 253.874003] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.881167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.890740] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.911630] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.926840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.944837] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.979085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.995462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.003200] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.009739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.026549] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.036466] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 254.064668] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 254.079225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.088936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.103398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.112848] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.119311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.135755] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.151764] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 254.158050] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.176108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 254.214870] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 254.223315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.237817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.272149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.306491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 254.322148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 254.363731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.371711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.389823] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.396302] bridge0: port 1(bridge_slave_0) entered forwarding state 03:23:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x401}, 0x8) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x803, 0x4) getsockname(r0, &(0x7f0000000440)=@alg, &(0x7f0000000180)=0x80) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) sendmmsg(r1, &(0x7f00000038c0), 0x4000000000000a8, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e24, @loopback}, 0x10) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64EXEC\x00', &(0x7f0000000340)=']\x00', 0x2, 0x0) [ 254.409738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.422218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 254.455277] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 254.474255] team0: Port device team_slave_0 added [ 254.490900] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 254.498730] team0: Port device team_slave_1 added [ 254.521239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.528301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.537290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.547745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.556420] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.562778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.573411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 254.582961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 254.598856] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 254.609566] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 03:23:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="99", 0x1}], 0x1) [ 254.626502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.634764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.642728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.659047] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 254.680401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 254.696852] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.707721] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.715214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.726262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.734740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.744945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 254.795690] device hsr_slave_0 entered promiscuous mode [ 254.853936] device hsr_slave_1 entered promiscuous mode [ 254.896837] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.903364] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 254.913307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.919674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.927949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.936376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 03:23:30 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x222001, 0x0) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) mq_notify(r0, &(0x7f0000000080)={0x0, 0x2, 0x6, @tid=r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123d319bd070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r3 = syz_open_procfs(r1, &(0x7f00000000c0)='net/rt_cache\x00') preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 254.943278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.951093] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.960359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 254.975186] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 254.985887] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.994879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.012714] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.025841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 255.037495] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 255.044455] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.052943] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 255.063658] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 255.069859] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.077600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 03:23:30 executing program 0: r0 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') unlink(&(0x7f0000000240)='./file2\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000002c0)={@xdp={0x2c, 0x1, r1, 0xd}, {&(0x7f0000000080)=""/140, 0x8c}, &(0x7f0000000180)}, 0xa0) [ 255.094554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.102515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.109748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.125409] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 255.145802] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 255.156626] overlayfs: failed to resolve './file1': -2 [ 255.161901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 255.173151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.188756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 03:23:30 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7f, 0xd0200) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='nodevvmnet1}/-wlan1\x00') r2 = socket(0x400000000000011, 0x2000000000000003, 0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, 0x0) open(&(0x7f0000000140)='./file0\x00', 0xa0680, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00L\xff\xff\xff\xc3`\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xfe\xff\xfe\xc0\x00\x03\x00\x02\xff', 0x4bfd}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r0, &(0x7f0000000280)="b45b6b80e8e4ad0dbd15b91b57d7bacb6cf5b4b4a22342e892a2c605867c23bffbadd654aaf4ea2cd9198cc79be80b775766c34569865bb92e2f95cb4a020c194deca9c5450954e68a7e14d5336c882da133e1978bd1cf0139ef19db8602c56bcb75603412db6fc10eef022b948d5cb22d63a9415e9ab10817c37b2edf9815ebdb0745c2fb2ddaa92c705e1bb00ffe67ee9997a0a123ee9a4d21f0cfe542fb5f87e06b777fd34f42f08bb3d5f2195003090857ad3efdccb101a4bca4882a4de1f840313b206ed989481709ee280c01a9d0", &(0x7f0000000180)=""/171}, 0x18) [ 255.198319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 255.209479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.218814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.227252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.235112] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.242414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.268976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.279821] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 255.286057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 255.304097] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 255.592436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 255.605458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 255.613330] device team0 entered promiscuous mode [ 255.618751] device team_slave_0 entered promiscuous mode [ 255.625937] device team_slave_1 entered promiscuous mode [ 255.632467] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.642683] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 255.652330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 255.664887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.674040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.681774] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.688204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.696359] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.704118] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.711670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.720088] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.727863] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.734281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.741954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.757819] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 255.771644] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 255.784422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.792381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.800402] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.806832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.814643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.827190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 255.836932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 255.849496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.859742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.869333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 255.879932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 255.892213] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 255.906057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.919108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.933047] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 255.942714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.950779] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.959093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.966929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.976238] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.990206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 256.013846] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.021136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.030874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.056351] audit: type=1400 audit(1556594611.105:42): avc: denied { create } for pid=7962 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 256.061079] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 256.097771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 03:23:31 executing program 1: openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = getpgid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0xfe800000, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) [ 256.112201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 256.126305] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 256.136062] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 256.152419] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 256.163446] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.176943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.197418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.230270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.246621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.262090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.270827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 03:23:31 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, 0x0) getpeername$netrom(r0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x22046050}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000005200000227bd7000fedbdf1600000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc00000003000600000000190200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1004}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, [""]}, 0x30}}, 0x0) r2 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000700)={'syz', 0x1}, &(0x7f0000000740)="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", 0x1000, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000001740)={r2, 0x1ff, 0x8}, &(0x7f0000001780)={'enc=', 'oaep', ' hash=', {'rmd256\x00'}}, &(0x7f0000001800)="97371791b9f0b1841e55ced039e3d22138685694870cbae66d8f16e0b63eeef568dcf45e43e2a1941b6aa66e13ea4785ffa11837df8267ab88511e6c36350bcbb61c2dddd84dd8162e380544784e65d062d040ca7d98aada0ea887414915b324c4160a48ae0f484b964dd3e48d8606f8ddbe50e37d71c22dfe5465b4dd4ca9abc90af6", &(0x7f00000018c0)="05ff9cff49f7cdace033f3f3e8e85c8d32ff0eba23e13f05f63b82523946f60a338e58807112bb617e2f7a4c3b890edb377a6967c82a677db79ff54fa20a0a137088680d0cb5f458cd5546d18863a65bd7cd5b1cba0fef233b7328c6d5f474e6d2e9382f5559a4120edc7c5689a2d660e922") r3 = add_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)="3e7c54c89f413b771ca3b72a6e33ac24c71d24489baa497f9b0dc0843ea51f644f2f83c0a939073e6cbd4f0cbc46089bdcd4ab710a6c3f203fe8a2f5ee7304775f2de9a0ea49610ba3934c1c308636ee108a62629cbac3b362fd67b2e28e5d9b8f3169e4e4cc894a10e4415420531326d3b4efc188ef941106326f430351818544834c6e3189046f501419018d522756d4139e82789a1f1f38c850e42c4d22e049f2534fcaee8a4a9c4148f1594b35a52c5903dacc7e249db73dd992c6613d713e7745927c663104efb9b79dbba4c1a46e39ce4ad510416c8547ec00761d52a77a6260b0b5974bd50929d6dd381cb1590e01ab3ee4dfc06c892f32", 0xfb, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000680)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r3, &(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x2}, r4) exit(0xfffffffffffffffd) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000380), &(0x7f00000003c0)=0x10) [ 256.291140] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.311498] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.335804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 256.343887] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 256.350053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.359550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.385711] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 256.395825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 256.404657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.412378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.426473] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 256.439187] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 256.449668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.457529] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.467105] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 256.473199] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.507671] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 256.515061] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.532119] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 03:23:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xd19014d4cc9217ac) getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)=0x0) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x5, &(0x7f0000001400)=[{&(0x7f00000001c0)="2b513b74a5bfb2c36ff3fcd2d6fc377ae332", 0x12, 0x4}, {&(0x7f0000001880)="20b969c4fa96fe430cf88d1fcccb3489aa95dbde01239a8945f86e7c8a3328073f8057495b032b50da76e2dd40c38e93f9b681fb0dc24ad4e41f288a734bdf6b257744ebad58e1a169892d0a4102663710fb0cec0fd1a04d713b5283d4facd7f34dd1b5ec3e0e00a500d3a67f30085aeecca55c835ca9a38e8b51806d47e27fb77b51037a807436421a553e853bb2146ae3800a36b9182da8c81efefa6235b46d28ea2177d774bb0b7bc4049883a0b1396aab8dfe8a39817fcd7f077db6f3e44547630a0167a2a8317e4345912ca0d423e5cf2acdbd83fce75f99ce227dbbc379b66096b1fcb7d8548", 0xe9, 0xffffffff}, {&(0x7f0000000300)="a0a96f0ec81c2b172db6cbeeef4e254a1fba9e2851a4035b3f1cf9191d1d0a3699497c9e3b81c4129a25e70d0176150f121fe6984e4000ea09640b3b5ac6b36977de516c9650e57d9ac26a871a129491e96163a5c8e335f07c8d41099afac18748de834fe63c35d456e4194e9ccbdc913c6c3f9f8fe715", 0x77, 0x1}, {&(0x7f0000000380)="41fbb908e3a0eb6fa5f42ec0b7f8664567bc9a5bd90b1108af3f87e68c06001ab4f03b3cfa50cf3351ed982e901d8cfe367edd6b4f2e703dc62611f70d0fcdca6355bd4a793e6f7d2907d19febad2d75e5e2191825", 0x55, 0xfffffffffffffff8}, {&(0x7f0000000400)="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", 0x1000, 0x8}], 0x804000, &(0x7f00000016c0)=ANY=[@ANYBLOB='session=0x0000000000000000,dir_umask=00000000000000000000004,dir_umask=00000000000000000067512,hash,obj_user=tls\x00,measure,fowner>', @ANYRESDEC=r1, @ANYBLOB="2d0005fbda1d802964b37e6f0d8003e36c4a3a8ac289b7cc36efb5108c2c8d98fd67a5663763dfc1245d51b2a430560b7dfde6d9951542246a1d5850b8a37e54400612b39bd56c335412866486dd9dd7c1688d7c66f3775f6ad667e4aef4ff6f516c79320671ec30d28df2a726f1d25482d0b3f0df5af6543e16127f7ae0dae14eea158426e71f7421459744fd1a5829dfb34c785a0e6cca251d1e761c33f6786063079b00ce2065139cbb293757df1904b4a5c7464239eb6780b540dc9abad952e9"]) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001540)='/dev/dsp\x00', 0x482000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000015c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000001680)={&(0x7f0000001580)={0x10, 0x0, 0x0, 0x20000900}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x14, r3, 0x200, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x80) ioctl$RTC_PIE_ON(r2, 0x7005) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000001840)) sendmmsg(r0, &(0x7f0000005f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x10}], 0x24}}], 0x1, 0x0) [ 256.550989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.563315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.593293] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.599867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.635416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.647423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 256.662582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.680978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.689222] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.695847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.712622] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 256.722552] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 256.743945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.761972] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 256.772004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 256.780374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.790898] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 256.802263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.811205] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.825142] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 256.840979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.848560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.856986] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.872317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 256.895345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.910173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.927049] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 03:23:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TIOCSETD(r0, 0x541b, &(0x7f0000000000)) fcntl$addseals(r0, 0x409, 0x0) [ 256.939956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.962478] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.982074] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 256.991165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.008491] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 257.022109] 8021q: adding VLAN 0 to HW filter on device batadv0 03:23:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 03:23:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000080)={0x55, 0x40}) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mbind(&(0x7f0000135000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsn(0x0, 0x0, 0x0) mmap$binder(&(0x7f00005c1000/0x4000)=nil, 0x4000, 0x2000080, 0x13, 0xffffffffffffffff, 0x0) sendmsg$nfc_llcp(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x3da, 0x0, 0x0, 0x0, 0x36}, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x804, 0x0) socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(0xffffffffffffffff, 0x110, 0x2, &(0x7f00000000c0)='-\'O\'mime_type\'trustedwlan0#\'.em0cgroup\x00', 0x27) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 03:23:32 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x200000001, {0x8, @pix={0x0, 0xffffffff00000001}}}) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000540)={0x0, 0xa8, 0x2, {0xb, @sliced={0x0, [0x0, 0x1f]}}}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000000)={0x80000000, 0x10001008}) ioctl$KDDELIO(r0, 0x4b35, 0x0) 03:23:32 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)=ANY=[], 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = inotify_init() setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000280)="393c7cd52dce9eca1b205550a7baee5dd81bdccdce70a26afc0cbe08443af1d28e1d2e179a72f0d92f5e89a5f978d431f8bff84cb32bc84ee632b2e5ec4d0d7cea61853f38c8f9e0dd7cae3bfafb6f28e37606113522df236e4d81c942425cff5109060a396fa4b77532e4760e28a92532cadff0a06e1f82a78d81a210ae5804b743b803ceae167fbfd64aedf13199257f951dbbc7fd996b25b7a86ecfe99587f6ec72530ea8ae2a0e69f539227520bd7037b860a59abbf459f9950cea34d51d33924cd7f3dfb7d6bc61e6", 0xcb) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) mlockall(0x6) r3 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5, 0x20500) inotify_add_watch(r4, &(0x7f00000000c0)='./file0\x00', 0x1) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000100)) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x4000082) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000380)={0xf, 0x13c, 0x8000, {0x0, 0x1c9c380}, 0x3, 0x101}) write$binfmt_elf64(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="65f336224bdd3b533505b3540906a7d2b6e81417ddac3f7579a9f7cb43df7977d2398d7aae159d1ca72389318a97654cb2f338e208935a4aee0ef447abda321bc89f4a4c9d2cf661f92d143117c175f6325f8671c851f73ce100e0ac9a58d48cd9f4624de5d1e9f816720c4dcfc5b494d24ce994e13e93e1e882dc5ede48c455dd212b722f8faf7af1915fa10afd6e49b938d4af5fdfea32f972c995740f11f084fa0587e0839d26766d74e04e9c509f04e15fb2c991084b8c332ec3babb1239c93d983929366fbdee71223701e80595368bc7"], 0xd3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = getuid() recvfrom$inet6(r4, &(0x7f0000000500)=""/214, 0xd6, 0x40000000, 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) chown(&(0x7f0000000180)='./file0\x00', r5, r6) sendfile(r3, r3, &(0x7f00000001c0), 0xa198) 03:23:32 executing program 4: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_ifreq(r0, 0x89bf, &(0x7f0000000040)={'syzkaller1\x00', @ifru_hwaddr=@broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3b, 0x27}}, &(0x7f0000000080)='GPL\x00\x83\xff\x13\x0f_\xb0\x0e][dC/\xa6\xbb)p\xc5\xa6$\x1e\x8d\xef\xd6S>*\xe1\x06\xbee\\lRcI!l0\xbb\x1f\x80\xfbE\x0e\xc0\xd5\xbe', 0x1, 0x1b9, &(0x7f0000000100)=""/153}, 0x48) 03:23:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000480)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe1000/0x18000)=nil, 0x0, 0x179, 0x0, 0x0, 0xffffffffffffff9a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000500)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5a11cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d370ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec8942ae46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bb7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114380b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfe2f) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:23:32 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x400, 0x60001) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f00000002c0)={0x6, 0x9, 0x1b, "4c221567746728c095987904379d19e4fd74109b3c7e72ee766ed8cb87c8fcd4de7d263a664b729794003b3ad164fc387077cc61ceaa1c5dea9b3846", 0x9, "01bd433b6d0adadebeed278c3525e7c6691766e9f52474b25656f36f1c1339cb499de81128fea25f92e3cea2286c9d187cedf506c0250f9a5409e5aa", 0x8}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000100)=ANY=[@ANYBLOB="88"]) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000180)) [ 257.142130] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 257.165310] audit: type=1400 audit(1556594612.215:43): avc: denied { prog_load } for pid=8008 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:23:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0xcc, 0x9}, 0x2c) socket$inet_sctp(0x2, 0x5, 0x84) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f0000000040), 0x0}, 0x18) 03:23:32 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x5000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 257.294879] audit: type=1400 audit(1556594612.325:44): avc: denied { map } for pid=8009 comm="syz-executor.0" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=27799 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 257.539313] audit: type=1400 audit(1556594612.495:45): avc: denied { map_create } for pid=8028 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:23:32 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000240)=0x68) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000540)=ANY=[@ANYBLOB="02ff00002e04000000000000000002000000110f00edd8e7008a18c07197950abaebbe5ab9ff00000600000000000000ae70a7340000000000"]) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000180)=0x4) r1 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000a}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x68, r2, 0x700, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x8000000, @media='ib\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in, @in=@initdev}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) sendmsg$can_bcm(r1, &(0x7f00000000c0)={0x0, 0x37e, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="060000007f0000000600000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000100006002020000038b20dbe2c30c89"], 0x80}, 0x1, 0x0, 0x0, 0xfffffffffffffffd}, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000440)={0x40, @tick=0x2000000000000, 0x2, {0x400, 0x200}, 0x9, 0x0, 0x2}) 03:23:32 executing program 0: r0 = socket$kcm(0x29, 0x7, 0x0) r1 = socket$kcm(0x10, 0x5, 0x10) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x400080, 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x10) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000300)={0x0, 0x618, 0x300f, 0x1}) clock_gettime(0x7, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000000)={0xda0, 0x4, 0x7, 0x7, 0x4, 0x8, 0x40, 0xffff}, &(0x7f0000000040)={0x4e, 0x5, 0x1, 0x4, 0x7, 0xffffffff, 0x8, 0x5}, &(0x7f0000000080)={0x8, 0x2, 0x2, 0x81, 0x0, 0x1, 0x0, 0x5}, &(0x7f0000000180)={r3, r4+30000000}, &(0x7f0000000240)={&(0x7f00000001c0)={0x8}, 0x8}) socket$bt_bnep(0x1f, 0x3, 0x4) socket$kcm(0x29, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="2e0000002000812de45ae087185082cf0700b0eba06ec400014100004c000017000040030000000051894dd65b2f", 0x2e}], 0x1}, 0x0) fallocate(r0, 0x0, 0x8, 0x39) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x40801, 0x0) ioctl$void(r0, 0xc0045c78) ioctl$KDADDIO(r5, 0x4b34, 0x87) accept$ax25(r2, &(0x7f0000000380)={{0x3, @rose}, [@default, @rose, @bcast, @remote, @netrom, @null, @default, @netrom]}, &(0x7f0000000400)=0x48) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f0000000480)={0x0, 0xfffffffffffffffb, 0x80000001, &(0x7f00000000c0)=0x1}) r6 = semget(0x1, 0x4, 0x4) semctl$GETNCNT(r6, 0x2, 0xe, &(0x7f00000004c0)=""/184) 03:23:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000a34fff)='H', 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00009fa000/0x3000)=nil, 0x3000, 0xe000, 0x3, &(0x7f0000bf8000/0xe000)=nil) madvise(&(0x7f0000a62000/0x1000)=nil, 0x1000, 0x10200000008) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000001600)='/dev/dmmidi#\x00', 0x3ff, 0x0) bind$inet(r1, &(0x7f0000001640)={0x2, 0x4e20, @remote}, 0x10) 03:23:32 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x4200) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x2, 0xc) r2 = socket$inet(0x10, 0x3, 0x0) dup2(r1, r2) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000010407051dfffd946fa283000c201e0009000100041d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 257.658640] audit: type=1400 audit(1556594612.495:46): avc: denied { map_read map_write } for pid=8028 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:23:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x3f00000000000000, 0x0, 0x29, 0x77, 0x0, 0x0, 0x4a02}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x210241, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000080)={0x3, "aed9a7"}, 0x4) [ 257.813771] audit: type=1400 audit(1556594612.855:47): avc: denied { write } for pid=8041 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 257.814175] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:23:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, {0x2, 0x2000004e24, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x98}) 03:23:33 executing program 0: r0 = socket$inet(0x2, 0x80007, 0xffffffffcb3f9302) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9, 0x301000) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000100)=0x5) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x168, [0x20000300, 0x0, 0x0, 0x20000408, 0x20000438], 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]}, 0x23e) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x580, 0x0) ioctl$VIDIOC_S_EDID(r3, 0xc0285629, &(0x7f0000000200)={0x0, 0x9, 0xc4, [], &(0x7f00000001c0)=0x3}) ioctl$CAPI_NCCI_OPENCOUNT(r3, 0x80044326, &(0x7f0000000080)=0x3) [ 258.005033] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:23:33 executing program 3: mkdir(&(0x7f0000000340)='./control\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/80, 0x50) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000880)=""/133, 0x85}, {&(0x7f0000000280)=""/167, 0xa7}, {&(0x7f0000000380)=""/165, 0x14}, {&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000780)=""/199, 0xc7}, {&(0x7f0000000600)=""/212, 0xd4}], 0x6) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ptmx\x00', 0x0, 0x0) socket$tipc(0x1e, 0x2, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000180)) 03:23:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x80007, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r1, &(0x7f0000000140)=@caif, 0x80) 03:23:33 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') setsockopt$rose(r0, 0x104, 0x2, &(0x7f0000000040), 0x4) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400020007d, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000080)={0x5, 0x0, {0x0, 0x3, 0x0, 0x3, 0x5}}) 03:23:33 executing program 5: getpid() openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 03:23:33 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback}}, 0x1e) connect$pptp(r0, &(0x7f0000000140)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) getsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 03:23:33 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) syncfs(r0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000040)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x408081, 0x0) fstatfs(r0, &(0x7f0000000080)=""/23) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f00000000c0)={0xfffffffffffffffc}) 03:23:33 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000040)=""/180) read(r0, 0x0, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000100)=0x81) socket$inet6_sctp(0xa, 0x1, 0x84) 03:23:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) 03:23:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x10000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/178) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 258.519423] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:23:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000580)={0x0, 0x20001800, 0x4000, 0x0, 0xffff, 0x1, 0x0, 0x2, 0x843, 0x3}) r1 = socket(0xa, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000680)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000000100020000000000be0000000000000002000000000000000000"], 0x1f) mount(&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="5dfdce7561f47e97b40356f4d833102b5eae8cd5763dcce528ce3519d4e73beb943d814ebcc46a58a8ac71227458f1fcb0c8cebe89871b11ba16e76989e225c070fd511a79f4a5627914caa76d082dc14b10e1623b4639f72e1b60620524a940b0fc7fa05e3ec488a6b7ed3c1b9c58678d8cfb4ecf7788337925a9433b9630fdc49df427e7f9e0e8fbe2df2e651ed8b0a7fc6931cf39272cb7431bd1dd8f1bcbd217ec15512671acff3d11966dae50543b8608889c800e9326cd67f88592463853ec5f45231f93995a", @ANYRES16=r0, @ANYBLOB="b4e76bd883cce207a18430682d5af7521799adf98c28b5f1f37bbc9ecef647d38c75239919684b134692f2442f4fd273b95df3990dc6a2c1c3e1b19d6e9e90c8355debd1c4a89113e617e93ecd27", @ANYRESDEC=r1, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2], @ANYRESDEC=0x0], @ANYRESHEX=r5, @ANYPTR64=&(0x7f0000000a00)=ANY=[@ANYRES32=r2, @ANYRES64], @ANYRESDEC=r3, @ANYRESHEX=r1, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYRES16=r0], 0x0, 0x0, 0x10000000, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="969957b52db7fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e601019df973b53d859e769464fe2a2410d59da45"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000340), &(0x7f0000000640)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r6 = dup2(r3, r3) ioctl$TCSBRKP(r5, 0x5425, 0x6) write$FUSE_OPEN(r6, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r3, &(0x7f0000000340)=[{&(0x7f0000004200)=""/4096, 0x1000}], 0x1, 0x2) ioctl$int_out(r5, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') utimes(&(0x7f0000000780)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) close(r3) lgetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f00000006c0)=@random={'security.', 'ramfs\x00'}, &(0x7f0000000740)=""/27, 0xfffffffffffffdfb) socket$inet_tcp(0x2, 0x1, 0x0) 03:23:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)="390000001300090468fe07002b0000000000ff0711000000450001070000001419001a000b00020007000a00550e00"/57, 0x39}], 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) getsockname$tipc(r2, &(0x7f0000000040)=@name, &(0x7f0000000100)=0x10) 03:23:33 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000006, 0x11, r1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x200000, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x5547427c}}, {@mode={'mode', 0x3d, 0x1c000}}, {@mode={'mode', 0x3d, 0xeeb9}}], [{@smackfsdef={'smackfsdef'}}, {@uid_gt={'uid>', r3}}, {@hash='hash'}, {@dont_measure='dont_measure'}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r4 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x8, 0x40000) write$P9_RLOCK(r4, &(0x7f00000002c0)={0x8, 0x35, 0x2}, 0x8) openat(r4, &(0x7f0000000040)='./file0\x00', 0x20000, 0x28) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1020007, 0x8031, 0xffffffffffffffff, 0x0) 03:23:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000940)='/dev/full\x00', 0x260e40, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000840)=[@textreal={0x8, &(0x7f00000002c0)="b80b008ee02e64640f0666b8285400000f23c80f21f866350c0000000f23f866b9800000c00f326635002000000f30bad104ec0f01d1f265f365f32ef30f02cf66b9af0a00000f323e0f01c90f32", 0x4e}], 0x1, 0x4c, &(0x7f0000000880)=[@vmwrite={0x8, 0x0, 0x2, 0x0, 0x9, 0x0, 0x7, 0x0, 0x800}], 0x1) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)={0x15c, r2, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xed}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10b}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="d9ef88bcff542cba57f1d84c1f723073"}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff}]}, 0x15c}, 0x1, 0x0, 0x0, 0x800}, 0x4004) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r3, 0x40046411, &(0x7f0000000280)=0xff) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0xae}, {&(0x7f0000000540)=""/154, 0xff80}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 03:23:33 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x7, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) [ 258.797299] *** Guest State *** [ 258.810690] CR0: actual=0x0000000000000031, shadow=0x0000000060000011, gh_mask=fffffffffffffff7 [ 258.862383] CR4: actual=0x0000000000002060, shadow=0x0000000000000020, gh_mask=ffffffffffffe871 [ 258.914466] CR3 = 0x0000000000002000 [ 258.948039] PDPTR0 = 0x0000000025bbd001 PDPTR1 = 0x0000000025bb7001 03:23:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}, 0x84000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000100)) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:23:34 executing program 2: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x403e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$2(0x2, 0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000240)=0x2, 0x4) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0xaa75, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000480)="c49901ed2b1b9238fa5c805d76659c5f257a1c0c7c8d226cd731c0f1598ee99735b7115448c15fddae081189c093a8102cd43fe9393819139525bfd394c1b4452bb506bc7d5d58b60c9baae6a404855a81eb0f707eff9d3f6a91d179ac9815acd709c1ff292593380266f983fbf84d5ddd0c66e457673705aea03f52d9b766a9f1341d2f7a30887e9e3ad3b4815455dd3754166712764e561234682d998fa47fd21938dc9e0fd8b098ed37290374f614c5b4c152015122100fef4818e9450f5fda9d6fa755bc851237085f8c1a70c9c8630f46b2a648") shutdown(0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r3 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0x93, "dd4fcae88cf62c284edc2a62c9e21d1d3026dd703032218acf41734e33795dafda1c17b325b95d63828413453aa8c194020cd51afe304673733204923290cd3febecfb768964cd9e3c1e1a3ec2bcd289120dfd73f6051735f9b66857023fe0f12468ee0345d945127a08029e85af4d935c471dd101ba8f6073889c0921ce69f7f41e34958b07914ce5ff2def666f44e625f242"}, &(0x7f0000000280)=0x9b) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000580)={r4, 0x9}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000040)=0x4, 0x4) getdents(r3, &(0x7f0000000000)=""/26, 0x1a) [ 259.233101] CS: sel=0x0030, attr=0x0409b, limit=0x000fffff, base=0x0000000000000000 [ 259.327243] DS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 259.393149] tmpfs: No value for mount option './file0' [ 259.440574] SS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 259.449070] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 259.458199] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 259.467077] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 259.493056] GDTR: limit=0x000007ff, base=0x0000000000001000 03:23:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@dev, 0x0, @remote, @netrom={'nr'}, 0x0, [@netrom, @remote, @default, @default, @default, @bcast, @remote, @rose]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) r2 = fcntl$getown(r1, 0x9) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='n\xde\x12Un\xb9\x060\xffc\x1d\x00\x00\x00\x00\x00\xebe\xfb\xdf\xc7\xfb>\xe41\xd7:\x18\x98 \xc7-.\xe7\xdfR\xb1\xe8\xd9\xfe\x7f') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 03:23:34 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000580)={0x0, 0x20001800, 0x4000, 0x0, 0xffff, 0x1, 0x0, 0x2, 0x843, 0x3}) r1 = socket(0xa, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000680)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000000100020000000000be0000000000000002000000000000000000"], 0x1f) mount(&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="5dfdce7561f47e97b40356f4d833102b5eae8cd5763dcce528ce3519d4e73beb943d814ebcc46a58a8ac71227458f1fcb0c8cebe89871b11ba16e76989e225c070fd511a79f4a5627914caa76d082dc14b10e1623b4639f72e1b60620524a940b0fc7fa05e3ec488a6b7ed3c1b9c58678d8cfb4ecf7788337925a9433b9630fdc49df427e7f9e0e8fbe2df2e651ed8b0a7fc6931cf39272cb7431bd1dd8f1bcbd217ec15512671acff3d11966dae50543b8608889c800e9326cd67f88592463853ec5f45231f93995a", @ANYRES16=r0, @ANYBLOB="b4e76bd883cce207a18430682d5af7521799adf98c28b5f1f37bbc9ecef647d38c75239919684b134692f2442f4fd273b95df3990dc6a2c1c3e1b19d6e9e90c8355debd1c4a89113e617e93ecd27", @ANYRESDEC=r1, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2], @ANYRESDEC=0x0], @ANYRESHEX=r5, @ANYPTR64=&(0x7f0000000a00)=ANY=[@ANYRES32=r2, @ANYRES64], @ANYRESDEC=r3, @ANYRESHEX=r1, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYRES16=r0], 0x0, 0x0, 0x10000000, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="969957b52db7fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e601019df973b53d859e769464fe2a2410d59da45"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000340), &(0x7f0000000640)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r6 = dup2(r3, r3) ioctl$TCSBRKP(r5, 0x5425, 0x6) write$FUSE_OPEN(r6, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r3, &(0x7f0000000340)=[{&(0x7f0000004200)=""/4096, 0x1000}], 0x1, 0x2) ioctl$int_out(r5, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') utimes(&(0x7f0000000780)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) close(r3) lgetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f00000006c0)=@random={'security.', 'ramfs\x00'}, &(0x7f0000000740)=""/27, 0xfffffffffffffdfb) socket$inet_tcp(0x2, 0x1, 0x0) [ 259.549383] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 259.624066] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 259.632100] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 259.632116] EFER = 0x0000000000000001 PAT = 0x0007040600070406 [ 259.632129] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 259.632139] Interruptibility = 00000002 ActivityState = 00000000 [ 259.632144] *** Host State *** [ 259.632157] RIP = 0xffffffff811c9f4c RSP = 0xffff888081b878c0 03:23:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000580)={0x0, 0x20001800, 0x4000, 0x0, 0xffff, 0x1, 0x0, 0x2, 0x843, 0x3}) r1 = socket(0xa, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000680)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000000100020000000000be0000000000000002000000000000000000"], 0x1f) mount(&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="5dfdce7561f47e97b40356f4d833102b5eae8cd5763dcce528ce3519d4e73beb943d814ebcc46a58a8ac71227458f1fcb0c8cebe89871b11ba16e76989e225c070fd511a79f4a5627914caa76d082dc14b10e1623b4639f72e1b60620524a940b0fc7fa05e3ec488a6b7ed3c1b9c58678d8cfb4ecf7788337925a9433b9630fdc49df427e7f9e0e8fbe2df2e651ed8b0a7fc6931cf39272cb7431bd1dd8f1bcbd217ec15512671acff3d11966dae50543b8608889c800e9326cd67f88592463853ec5f45231f93995a", @ANYRES16=r0, @ANYBLOB="b4e76bd883cce207a18430682d5af7521799adf98c28b5f1f37bbc9ecef647d38c75239919684b134692f2442f4fd273b95df3990dc6a2c1c3e1b19d6e9e90c8355debd1c4a89113e617e93ecd27", @ANYRESDEC=r1, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2], @ANYRESDEC=0x0], @ANYRESHEX=r5, @ANYPTR64=&(0x7f0000000a00)=ANY=[@ANYRES32=r2, @ANYRES64], @ANYRESDEC=r3, @ANYRESHEX=r1, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYRES16=r0], 0x0, 0x0, 0x10000000, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="969957b52db7fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e601019df973b53d859e769464fe2a2410d59da45"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000340), &(0x7f0000000640)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r6 = dup2(r3, r3) ioctl$TCSBRKP(r5, 0x5425, 0x6) write$FUSE_OPEN(r6, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r3, &(0x7f0000000340)=[{&(0x7f0000004200)=""/4096, 0x1000}], 0x1, 0x2) ioctl$int_out(r5, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') utimes(&(0x7f0000000780)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) close(r3) lgetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f00000006c0)=@random={'security.', 'ramfs\x00'}, &(0x7f0000000740)=""/27, 0xfffffffffffffdfb) socket$inet_tcp(0x2, 0x1, 0x0) [ 259.632177] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 259.953759] FSBase=00007f3c70ea5700 GSBase=ffff8880ae900000 TRBase=fffffe0000034000 [ 260.031459] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 260.094088] CR0=0000000080050033 CR3=00000000a8c83000 CR4=00000000001426e0 [ 260.126402] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff870013a0 [ 260.151475] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 260.164901] *** Control State *** [ 260.170872] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 260.177877] EntryControls=0000d1ff ExitControls=002fefff [ 260.183356] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 03:23:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x7a1) write$uinput_user_dev(r1, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) syz_emit_ethernet(0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="2ae29c3e6000000b6840e686c70828b224ab66b1f402fbb0d66d96c34249281b0769f55ed5baff0f000000000000ad9da59473838a39edd6cffc1587dbd8f11cdfc2806e0a5ffe65800827911beb08baacd98a2abe681e19cea772d034d0b8ec6468f97b0125b1bcf2f788f286ec67b7c0b6a5b41088ba40b3c5aa8992fb07ef1812a5c65e2c23941f7684ff51fafd2b0ad513622ce5ceb65c7f305a33793dd0b8d9938757ddcc20626ebeb93bffed5f212984a391a308f7a4ddea6ab84ae8fc5b654020f857e5ddc427dcb67e8a56"], 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2f666544396e62643000cbdf46fcdf2070e51e470f230b8bcafddf5e592e3c4e42e90a1380ad01b2134d880588f5b990f39e9a2060495b1b73c8f8d261fb86da753940a2ce6bd85bf5acc3e7023ab60bb1ef4fd1bc45c5bda8507b3c9ba088df7b4cf1f41a6432705d9067a22d62b6eeccea802324b306cf0a773387c0942869ea0bfbb9e77cce0ad9cd96acebad4a791bcd4feac7bf2e41454928d0764d6a5390bc0a5d18d545932142455d761003fed1c9bb3272ba8c8071d980c47bb8b1c1"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='erofs\x00', 0x20000, &(0x7f0000000240)='/dev/uinput\x00') fcntl$dupfd(r0, 0x406, r0) 03:23:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000080)={0x8, 0x120, 0xfa00, {0x2, {0x3, 0x91, "25f5172b52f31422d252c911d85a2a3c7c2f95f592d3614e9ef8a7317de5393f4dd82f92996508b82ee0f0e8666934095dac306cff39ff68aec607e2b9a56e5e2553233ce59fde1a19a36f4d28c63c137eb1ae4fe901b0569b32bfca8abe3f5456e2cb66623b0b573d8b8be5b0b2e80decbff96934f3ed0e5b534ea585831f7b57e0fcae41ba278f33702114b240e3ba274900c4d78db83b2ce175001d3ea462d61f0869de4e0b846f8d5bea5ba2775a73d275d48f624cc85529df5dd3c2dd48311956e6470e2a416458a7929462a08d48c7854359e87c8d19de082a4cbbd6779b06e96dc3c8faf3c09c28b38bd5e02079c056b5c2c0224ee383309645267bcb", 0x50, 0xff, 0xd0, 0x3, 0x5, 0x6, 0x7, 0x1}, r1}}, 0x128) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400001000000) 03:23:35 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x1c2, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) connect$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffd9b) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0xffffffffffffffdc) 03:23:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@dev, 0x0, @remote, @netrom={'nr'}, 0x0, [@netrom, @remote, @default, @default, @default, @bcast, @remote, @rose]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) r2 = fcntl$getown(r1, 0x9) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='n\xde\x12Un\xb9\x060\xffc\x1d\x00\x00\x00\x00\x00\xebe\xfb\xdf\xc7\xfb>\xe41\xd7:\x18\x98 \xc7-.\xe7\xdfR\xb1\xe8\xd9\xfe\x7f') preadv(r3, &(0x7f0000000480), 0x100000000000022c, 0x0) 03:23:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f00000000c0)={0x1, 0xfffffffffffffffd, 0x9, 0x4, 0x18, 0x9}) socket$nl_route(0x10, 0x3, 0x0) 03:23:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000580)={0x0, 0x20001800, 0x4000, 0x0, 0xffff, 0x1, 0x0, 0x2, 0x843, 0x3}) r1 = socket(0xa, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000680)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000000100020000000000be0000000000000002000000000000000000"], 0x1f) mount(&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="5dfdce7561f47e97b40356f4d833102b5eae8cd5763dcce528ce3519d4e73beb943d814ebcc46a58a8ac71227458f1fcb0c8cebe89871b11ba16e76989e225c070fd511a79f4a5627914caa76d082dc14b10e1623b4639f72e1b60620524a940b0fc7fa05e3ec488a6b7ed3c1b9c58678d8cfb4ecf7788337925a9433b9630fdc49df427e7f9e0e8fbe2df2e651ed8b0a7fc6931cf39272cb7431bd1dd8f1bcbd217ec15512671acff3d11966dae50543b8608889c800e9326cd67f88592463853ec5f45231f93995a", @ANYRES16=r0, @ANYBLOB="b4e76bd883cce207a18430682d5af7521799adf98c28b5f1f37bbc9ecef647d38c75239919684b134692f2442f4fd273b95df3990dc6a2c1c3e1b19d6e9e90c8355debd1c4a89113e617e93ecd27", @ANYRESDEC=r1, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2], @ANYRESDEC=0x0], @ANYRESHEX=r5, @ANYPTR64=&(0x7f0000000a00)=ANY=[@ANYRES32=r2, @ANYRES64], @ANYRESDEC=r3, @ANYRESHEX=r1, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYRES16=r0], 0x0, 0x0, 0x10000000, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="969957b52db7fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e601019df973b53d859e769464fe2a2410d59da45"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000340), &(0x7f0000000640)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r6 = dup2(r3, r3) ioctl$TCSBRKP(r5, 0x5425, 0x6) write$FUSE_OPEN(r6, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r3, &(0x7f0000000340)=[{&(0x7f0000004200)=""/4096, 0x1000}], 0x1, 0x2) ioctl$int_out(r5, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') utimes(&(0x7f0000000780)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) close(r3) lgetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f00000006c0)=@random={'security.', 'ramfs\x00'}, &(0x7f0000000740)=""/27, 0xfffffffffffffdfb) socket$inet_tcp(0x2, 0x1, 0x0) [ 260.196377] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 260.203074] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 260.210183] reason=80000021 qualification=0000000000000000 [ 260.216628] IDTVectoring: info=00000000 errcode=00000000 [ 260.222096] TSC Offset = 0xffffff73304d23b3 [ 260.226903] EPT pointer = 0x0000000085ec801e [ 260.372814] audit: type=1400 audit(1556594615.415:48): avc: denied { dyntransition } for pid=8166 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 03:23:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f00000000c0)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x248000, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) syz_genetlink_get_family_id$ipvs(0x0) write$P9_RCREATE(r2, 0x0, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) recvmsg(r1, &(0x7f0000000680)={&(0x7f00000001c0)=@generic, 0x80, &(0x7f0000000380)=[{&(0x7f0000000480)=""/239, 0xef}, {&(0x7f0000000300)=""/11, 0xb}, {&(0x7f0000000580)=""/206, 0xce}], 0x3, &(0x7f0000000400)=""/40, 0x28}, 0x20) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='bic\x00', 0x4) ioctl$NBD_DO_IT(r4, 0xab03) socket$inet_sctp(0x2, 0x0, 0x84) 03:23:35 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x80d40, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20800}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="e4000000", @ANYRES16=r2, @ANYBLOB="000828bd7000fcdbdf25100000007c0004000c00010073797a31000000004c000700080002000000000008000200c6d45e41b6a460df0101000008000200070000000800020052b3000008000100090000000800030004000000000003004b0d000008000300000000800c00010073797a31000000001400010062726f6164636173742d6c696e6b0000300006000400020008000100f9ffffff04000200080001000900000008000100040000000800010050ea00000400020008000600040002001c000500080001006574680008000100696200000800010069620000"], 0xe4}}, 0x0) listen(r0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) write$P9_RREMOVE(r4, &(0x7f0000000080)={0x7, 0x7b, 0x1}, 0x7) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000300)=0x4, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000000)={'bcsh0\x00', {0x2, 0x4e24, @multicast2}}) syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) 03:23:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_thread_area(&(0x7f0000000580)={0x0, 0x20001800, 0x4000, 0x0, 0xffff, 0x1, 0x0, 0x2, 0x843, 0x3}) r1 = socket(0xa, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000680)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="02000000000100020000000000be0000000000000002000000000000000000"], 0x1f) mount(&(0x7f0000000a40)=ANY=[@ANYPTR64=&(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="5dfdce7561f47e97b40356f4d833102b5eae8cd5763dcce528ce3519d4e73beb943d814ebcc46a58a8ac71227458f1fcb0c8cebe89871b11ba16e76989e225c070fd511a79f4a5627914caa76d082dc14b10e1623b4639f72e1b60620524a940b0fc7fa05e3ec488a6b7ed3c1b9c58678d8cfb4ecf7788337925a9433b9630fdc49df427e7f9e0e8fbe2df2e651ed8b0a7fc6931cf39272cb7431bd1dd8f1bcbd217ec15512671acff3d11966dae50543b8608889c800e9326cd67f88592463853ec5f45231f93995a", @ANYRES16=r0, @ANYBLOB="b4e76bd883cce207a18430682d5af7521799adf98c28b5f1f37bbc9ecef647d38c75239919684b134692f2442f4fd273b95df3990dc6a2c1c3e1b19d6e9e90c8355debd1c4a89113e617e93ecd27", @ANYRESDEC=r1, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESHEX=r3, @ANYRESDEC=r2], @ANYRESDEC=0x0], @ANYRESHEX=r5, @ANYPTR64=&(0x7f0000000a00)=ANY=[@ANYRES32=r2, @ANYRES64], @ANYRESDEC=r3, @ANYRESHEX=r1, @ANYRESOCT=r3, @ANYRESOCT=r4, @ANYRES16=r0], 0x0, 0x0, 0x10000000, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="969957b52db7fea3a6945a209691fd3e214cb9dcc33db7762efad2628dcef5d3b6364e601019df973b53d859e769464fe2a2410d59da45"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000000340), &(0x7f0000000640)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r6 = dup2(r3, r3) ioctl$TCSBRKP(r5, 0x5425, 0x6) write$FUSE_OPEN(r6, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r3, &(0x7f0000000340)=[{&(0x7f0000004200)=""/4096, 0x1000}], 0x1, 0x2) ioctl$int_out(r5, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') utimes(&(0x7f0000000780)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) close(r3) lgetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f00000006c0)=@random={'security.', 'ramfs\x00'}, &(0x7f0000000740)=""/27, 0xfffffffffffffdfb) socket$inet_tcp(0x2, 0x1, 0x0) 03:23:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x200000) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x208000) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000080)=""/143) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000000)=0x9) getsockopt$inet_udp_int(r2, 0x11, 0x5c1572ad312e50a8, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000380)="ad56b6cc0400fb8b65dc5c6e807ad7bed7ceee660cd89ddffeb4d71c14853e922404b8ce4949d9232625745fde36e2a77b0df50b8af1caa4f682ab87d306007f2a3fc8a63de4f8f9dd5507b52ebdc2d0e4b6d9ce58377c1e316708000000000000008a082ec2190e909c34f38566a4a328a773a4ba5105979016c3a967d22f06899677cfd7ae54802f199a9e090bd0ef39038a79e9ceffcba0e04e273e38bdabb6c9e9895632760f5945a13befcaab3d80719a9bd2f79cbeb572db43700d1f635999e196e5", 0xc5) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000280)={0x0, 0xfffffffffffffd61, &(0x7f0000000200)={&(0x7f0000000240)={0xfffffffffffffef1, 0x0, 0x0, 0x0, 0x8000000, {{0x1, 0x0, 0xffffff8d}, 0x0, 0x400b, 0x448e370e0511d35e}}, 0xc90d9ee4}, 0x1, 0x0, 0x0, 0x20004011}, 0x0) 03:23:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000200)={r4, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x5b23, 0x7bd, 0x8, 0x81, 0x80}, 0x98) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000380)=[@text64={0x40, &(0x7f0000000340)="440f20c0350d000000440f22c06d6626d9e966b884000f00d066baa100b80e000000ef26673e0fc72b460f01df45195bf2c481792b42ac66b82d010f00d0", 0x3e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x1d9) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:23:35 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) 03:23:35 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() fsetxattr$security_evm(r1, 0x0, &(0x7f0000000080)=ANY=[], 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28"]) chdir(&(0x7f0000000380)='./file0\x00') setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000640)={{0x0}, &(0x7f0000000600), 0x40}, 0x20) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x668, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file1/file0\x00', &(0x7f0000000300)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open$cgroup(&(0x7f0000000400)={0x5, 0x70, 0x4, 0x4960, 0x200, 0x6, 0x0, 0x0, 0xe88a0, 0xb, 0x0, 0x5, 0xfffffffffffffff8, 0x5, 0xc7f, 0x28, 0x100000000, 0x8, 0x4, 0xfffffffffffff764, 0xfff, 0x4, 0x9, 0x7, 0x401, 0xe9c8, 0x7, 0x40, 0x0, 0x7, 0xfffffffffffffffc, 0x10000000000, 0xbc, 0x2, 0x3, 0x5, 0x6, 0x94fb, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x200, 0x800, 0x0, 0x8, 0x400, 0x95a1, 0x4}, r2, 0xc, 0xffffffffffffffff, 0x1) 03:23:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='wchan\x00') ioctl$KVM_RUN(r1, 0xae80, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) sendfile(r2, r1, 0x0, 0x4) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000200), 0x2) 03:23:36 executing program 4: r0 = inotify_init1(0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0x80) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000040)={'raw\x00', 0x55, "7457cd9e8e9c299f40cc2b2fb0e30ab02e4b79518f4a31d3352ff669593c6d74e32be4e6c7717b24850b7d903020e484fe7b5306442525f6bb568aa637965554fc1c9a11d83cc934ae8a8b9ff3ff812314ef6ed0cc"}, &(0x7f00000000c0)=0x79) socket$inet(0x2, 0x5, 0x7) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x8582) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000100)=0x3) 03:23:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="61dfbeb005dccab9cec205ef323f3c0adc20c40201000000ed7a") creat(&(0x7f00000001c0)='./file0\x00', 0x89) acct(&(0x7f0000000080)='./file0\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) [ 260.988954] audit: type=1804 audit(1556594616.035:49): pid=8204 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir999239910/syzkaller.aeE8uy/11/file0/memory.events" dev="overlay" ino=29078 res=1 03:23:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7ffc, &(0x7f0000000100)="0adc1f123c123f319bd070fe992b032992c91a730f0d9a297d48153c0f484c34d2d9769368186e3d792d80c1a231bdc4dfb1ee14b44ef6aaa2c2947aa0433901000000000000b83c0992df819762ada2353b4935293cac86bbb60c54c968c5a4f2bd19fad4ac96090200"/118) r1 = epoll_create1(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') flock(r1, 0x1ffe) readv(r2, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) 03:23:36 executing program 0: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x25}, 0x45c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000e95fe0), 0x20) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)) r2 = fcntl$getown(r1, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000040)='fdinfo\x00') setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm, @timestamp, @mss={0x2, 0x9}, @timestamp, @mss={0x2, 0x8}, @sack_perm], 0x6) r4 = syz_open_procfs(r2, &(0x7f0000000200)='net/if_inet6\x00') getsockname$ax25(r4, &(0x7f0000000140)={{}, [@rose, @rose, @bcast, @rose, @default, @default, @rose, @netrom]}, &(0x7f00000000c0)=0x48) ioctl$UI_DEV_CREATE(r4, 0x5501) preadv(r4, &(0x7f0000000140), 0x391, 0x51) ioctl$VIDIOC_LOG_STATUS(r4, 0x5646, 0x0) [ 261.123186] Process accounting resumed [ 261.240136] Process accounting resumed [ 261.591117] overlayfs: filesystem on './file0' not supported as upperdir [ 261.672050] overlayfs: './file0' not a directory 03:23:36 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000200)) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x40000, 0x0) 03:23:36 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x16) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{}, 'syz0\x00'}) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) pivot_root(&(0x7f0000000480)='./file0/../file0\x00', &(0x7f00000004c0)='./file0/../file0\x00') msgsnd(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000ef3ce95b3d2d088334bf8ebc2f7c52218d60b82895ffe3a7d7fe8a65e6bbbd2ac4d987d122ef0c77e4c37b97beea2e9187fe1799b19a9875fffbe367bd4c786c45f9091d646ea758b7212d4e859410e7347e81ccdf02eca02ba25248931029a6170a8a1b86c16609de29ad603f371a957071670000ebb9abea9d47b5ad70936f3f3fa0d6877821a9e49677f135a4bf4eec99b7d7c8d163ac179a2af3"], 0x9e, 0x800) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) 03:23:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@noacl='noacl'}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) 03:23:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x3f1, 0x8, 0x6, 0x8}]}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="230001000002000000000000000000000000e5ff00b5460d58cf828dc6f12900000000666400"], 0xfffffffffffffff3) 03:23:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) close(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x463) accept4(r1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) 03:23:36 executing program 3: getpid() sched_setscheduler(0x0, 0x5, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r1, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x8001) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x14) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x8000001a, 0x0, 0x0, 0x0) [ 261.696556] audit: type=1804 audit(1556594616.745:50): pid=8238 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir999239910/syzkaller.aeE8uy/11/file0/memory.events" dev="overlay" ino=29078 res=1 [ 261.734598] syz-executor.3 (8204) used greatest stack depth: 22384 bytes left [ 261.816351] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:23:36 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f0000000200)='./file0\x00', 0x14) r1 = accept(r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x200, 0x8001, 0x9, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x7, 0x200, 0x9, 0x6, r2}, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="6826ad86", @ANYRES16=r3, @ANYBLOB="030100000000fcdbdf25010000000000000007410000004c00180000000069620300"/98], 0x68}}, 0x0) [ 261.867747] gfs2: not a GFS2 filesystem [ 261.927371] gfs2: not a GFS2 filesystem 03:23:37 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000, 0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f00000001c0)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200)={r1, 0x4}, 0x8) write$P9_RSTAT(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="850000007d020000007e003d9a020000000104000000010000000000000000fe040000000000fffffeff7f00000000000000040078667300360054706f6869785f61636c5f6163636573736e6f646576266d643573756d7b706f7369785f61636c5f6163636573732e73797374656d00001100298d6f00005931776c616e31776c616e3100"], 0x85) 03:23:37 executing program 1: syz_execute_func(&(0x7f0000000000)="1c1841d9cc981b69e4f56962f5696200d9d98517795b69f9f9680c0000008fe9589b26f1c6c4213335fd98000000000000d4f4663ed107c4c2b90a23f216657051c422b18cb607000000f551ccc4a27f181ec4210dfd844200000000ea01eff265dc5f003e460fc37d105bad45e145af000f9a9999030faee42c240f54c402d547acc7d70000003ef3407104a1e1e0ef26400f0d18c401fe5ff6e30fad6736660fd2938c000000c4fef913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f00000001c0)=0x6) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x0, 0x200a00) r2 = gettid() ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8001) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000200)=""/4096) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000140)=r2) [ 262.011769] audit: type=1400 audit(1556594617.055:51): avc: denied { accept } for pid=8263 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:23:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) r1 = creat(0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000240)) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000000)={0x0, 0x4, 0x40, 0x7, 0x5, 0x7, 0x2}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x4) prctl$PR_GET_KEEPCAPS(0x7) r2 = openat(0xffffffffffffffff, 0x0, 0x4000, 0x0) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) shutdown(r0, 0x1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000100)={0x8}) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) 03:23:37 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, 0x7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r1, 0x6}, &(0x7f0000000240)=0x8) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@null=' \x00', 0x3, 'hwsim0\x00'}) r2 = getpgid(0x0) r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/mcfilter\x00') creat(&(0x7f0000000000)='./file0\x00', 0xb6) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 03:23:37 executing program 3: socket$kcm(0x29, 0x2, 0x0) syz_execute_func(&(0x7f0000000680)="98a84a2ae92c211c420f05bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b016d7d14dee509c421045f4607c422adaf50e3c4e10bf8c45b70c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaf4c10f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c0000a80dd4d48f6978d25debe8628f680864360fe25800218de3c0f52641802d08000000fa49c4f6a1dd7dbbbfdd5c450f918fffefffffbedcdca1c9fb110f66474f383ae34ba29fb7e2") r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x7f, 0x0, 0x10003, 0x7}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0xf5, r1}) 03:23:37 executing program 1: r0 = socket(0x200000000000001d, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1000000036, &(0x7f00000000c0)=0xa, 0xfffffffffffffd26) 03:23:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x8800, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000200)={0x6, &(0x7f0000000100)="062c3cc07493d47b932f2dd6b67c761f2ca8ce0cef513247cb400ae4bc72104d3ebcca2e2e625530009bca11237aeb152b71c0b2b3b34b0378936f9d66c00639c5dff92b6c9ae363589f4b259252bcbdecc46f41f4f35d78c72b3ae21f4d98bc2eaed31dd9b29d42592595b8cf6b44a738930a18bcc3fe1c919fd1a4c8d40149fe9085aa9c4dce159a42a6f44bd14b964c1eeed0431b4269fea551f8e27d3ab41c449ccdb9a0d29d23521a3a8790c14659e2727d8bcd4d818f350690531798f6ff82ea680b8dc00932cdc4974f0001e16b4b85d48f44da34ad7feb24473b1df0"}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x0, 0x0) ioctl(r2, 0x800000000000937e, &(0x7f0000000080)="030000000000000018") seccomp(0x1, 0x0, &(0x7f0000000280)={0x5, &(0x7f0000000240)=[{0x5, 0xbc4, 0x0, 0x7}, {0xda, 0x1, 0x6, 0x1}, {0x400, 0xff, 0x3, 0x1}, {0x7ff, 0x6, 0x6, 0x1}, {0x4, 0xfffffffffffffff7, 0xdd, 0x7}]}) 03:23:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420750465723a6e6f646576203030303030303030302b3030303030303030353700"], 0x2c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffe) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x80800) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0)=0x5, 0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x2000, 0x0) openat(r2, &(0x7f0000000200)='./file0\x00', 0xd00, 0x100) 03:23:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x202, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x9, 0x0, 0x1, 0x401}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f00000000c0)={0x41a7, r2, 0x0, 0xe6e3}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xfffffffffffffff7}, {0x80000006}]}, 0x10) [ 262.584439] device team0 left promiscuous mode [ 262.602729] device team_slave_0 left promiscuous mode 03:23:37 executing program 3: exit_group(0x9) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x200, @dev={0xfe, 0x80, [], 0x26}, 0x8}}, [0x69, 0x0, 0x9, 0xfffffffffffff43e, 0x0, 0x6, 0x1, 0xcb, 0x6, 0x800, 0x8, 0x7fffffff, 0x8, 0x40, 0xfffffffffffffffc]}, &(0x7f0000000180)=0x100) mount(&(0x7f0000000200)=@md0='/dev/md0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x841088, &(0x7f00000002c0)='/dev/admmidi#\x00') setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x3, 0x8, 0x7, 0x2, r2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x40000000000000, @local}, 0x48) [ 262.627163] device team_slave_1 left promiscuous mode [ 262.641434] can: request_module (can-proto-0) failed. [ 262.703848] can: request_module (can-proto-0) failed. [ 262.730867] encrypted_key: master key parameter 'uer:nodev' is invalid 03:23:37 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000080)={0x100080001, 0xfffffffffffffffd}) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x20000004) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGETD(r1, 0x5405, 0xfffffffffffffffd) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x0, 0x1, 0x2}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000180)={0x0, 0xb2, "e7bb5a19b42de6f6c8d427a4b2a71b9d231fe3f40e025fc58fe3b2af83564a81c59921cc28fc2e9bf5bd62810e4c088bb5e938da82215344ad665774c246954e7cd41d4b8c7d29fb1f45f7c8c2cb4a5977f6f7abf56de03bdc8058356f3f8612db25ef79e64d3e908016d4e419fbd836bdb4e704f17fe37a7174f84bc778c4f62a71bb412d43bb129cf3bee6ed249fb8845b9ac3d66b6ba649aa53d33d6c53bf87ee56791a4454a20496e70121ac817222b3"}) 03:23:37 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x341400, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f00000000c0)) syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa00a29ab0893fde86dd603f3a5400142f00fe8000000000000000000000000000bbff02000000000000000000000000000100008100", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="318e8121d46580c193e99f5f4682f65e895c00ffff4d00"], 0x0) [ 262.762361] autofs4:pid:8311:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(3.0), cmd(0x0000937e) [ 262.835310] autofs4:pid:8311:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 03:23:38 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x50, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x26, &(0x7f0000000140)={@dev={0xac, 0x14, 0x14, 0x1e}, @multicast2, @dev={0xac, 0x14, 0x14, 0x21}}, 0xc) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) init_module(&(0x7f0000000240)='/selinux/policy\x00', 0x10, &(0x7f0000000280)='cgroup\x00') sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") sendto$inet(r3, &(0x7f00000001c0)="3d892ce2a571bc7d19203c8280f3a330c40def46882bdeb24fee3593b8d2d252bef295e917cbd13d9497204b08f00dae8d7e3fd3a5422635954756158d27e7baa4206870a3b50586c00a84903e5112f50e4575e1d4ffd1", 0x57, 0x1, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000180)) [ 263.273690] device team0 entered promiscuous mode [ 263.278791] device team_slave_0 entered promiscuous mode [ 263.293905] device team_slave_1 entered promiscuous mode [ 263.306922] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.324162] encrypted_key: master key parameter 'uer:nodev' is invalid [ 263.334527] autofs4:pid:8311:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(3.0), cmd(0x0000937e) [ 263.363735] autofs4:pid:8311:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) [ 263.406549] device team0 left promiscuous mode [ 263.411321] device team_slave_0 left promiscuous mode [ 263.429199] device team_slave_1 left promiscuous mode [ 263.767250] device team0 entered promiscuous mode [ 263.772439] device team_slave_0 entered promiscuous mode [ 263.784555] device team_slave_1 entered promiscuous mode [ 263.795288] 8021q: adding VLAN 0 to HW filter on device team0 03:23:38 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9c, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) getsockname(r1, &(0x7f0000000180)=@caif=@rfm, &(0x7f0000000080)=0x80) write$cgroup_type(r2, &(0x7f0000000280)='threaded\x00', 0x9) read(r2, 0x0, 0x0) fchdir(r0) 03:23:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x14}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000300)=""/195}, 0x48) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)=0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000800)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000780)={&(0x7f0000000840)=ANY=[@ANYBLOB="a4020000", @ANYRES16=r2, @ANYBLOB="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"], 0x2a4}, 0x1, 0x0, 0x0, 0x1}, 0x8000) prlimit64(r1, 0x0, 0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) write(0xffffffffffffffff, &(0x7f0000000180)="22000000e80b0f45a1d7b1ccff652186979f580700f417e512b87cba48c1cb65d145", 0x22) 03:23:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x30a, 0x2000000000000029, 0x7, 0x0, 0x0, {0xe}}, 0xffffffffffffffb8}, 0x1, 0x0, 0x0, 0x4801}, 0x10) 03:23:38 executing program 5: ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f00000003c0)) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x44a000) ioctl$PPPIOCSMAXCID(r0, 0x40047451, 0x0) socket$inet_udp(0x2, 0x2, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r2 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a3ee61b5a6891c6ac13e1d946ca1aa775114b730a3a95c394c1feb259fc46b56"], 0x1}}, 0x44801) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x40, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) mount(0x0, 0x0, 0x0, 0x0, 0x0) 03:23:38 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0xf, 0x2, 0x2, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_lifetime={0x4, 0x0, 0x1f, 0x4, 0x10000, 0xfffffffffffffffd}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x60}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x60000, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000440)={0x14, 0x49, 0x1, {0xb, 0x1, 0x5}}, 0x14) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000002c0)={0x1, 0x2, 0x400}) r2 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x0, 0x2) r3 = syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x2, 0x2) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') prctl$PR_GET_TSC(0x19, &(0x7f0000000400)) write$P9_RREADDIR(r2, &(0x7f0000000380)={0x49, 0x29, 0x2, {0x572c9879, [{{0x24, 0x0, 0x2}, 0x4, 0x3ff, 0x7, './file0'}, {{0x40, 0x2, 0x6}, 0x7, 0x792, 0x7, './file0'}]}}, 0x49) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8860284}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r4, 0x108, 0x70bd28, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2c}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000100)=0x32) 03:23:39 executing program 2: socket$inet(0x2, 0x80003, 0xfffffffffffffffd) [ 263.948292] device bridge_slave_1 left promiscuous mode [ 263.991032] audit: type=1400 audit(1556594619.035:52): avc: denied { prog_run } for pid=8335 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 264.024860] bridge0: port 2(bridge_slave_1) entered disabled state 03:23:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000080)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000180)={0x0, 0x6, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="e75603079727"}, 0x10) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1e, 0x2013, r0, 0x0) [ 264.052731] device bridge_slave_0 left promiscuous mode [ 264.084185] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.286607] device hsr_slave_1 left promiscuous mode [ 264.341947] device hsr_slave_0 left promiscuous mode [ 264.397479] team0 (unregistering): Port device team_slave_1 removed [ 264.410028] team0 (unregistering): Port device team_slave_0 removed [ 264.421431] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 264.477486] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 264.570534] bond0 (unregistering): Released all slaves [ 264.880965] IPVS: ftp: loaded support on port[0] = 21 [ 265.001098] chnl_net:caif_netlink_parms(): no params data found [ 265.073446] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.081734] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.094595] device bridge_slave_0 entered promiscuous mode [ 265.103276] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.116401] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.127292] device bridge_slave_1 entered promiscuous mode [ 265.162592] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 265.180162] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 265.212042] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 265.226659] team0: Port device team_slave_0 added [ 265.232601] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 265.247030] team0: Port device team_slave_1 added [ 265.252586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.266848] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 265.336812] device hsr_slave_0 entered promiscuous mode [ 265.404038] device hsr_slave_1 entered promiscuous mode [ 265.444312] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 265.451454] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 265.480118] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.486589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.493269] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.499732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.576032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.594015] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 265.605476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.613371] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.620870] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.632911] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 265.640239] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.651307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 265.659360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.668542] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.677146] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.683600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.694631] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 265.706403] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 265.713724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.721736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.730518] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.736982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.745111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 265.756432] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 265.764589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 265.777182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 265.784635] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.792836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.805920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 265.814753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 265.822764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.831710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.847813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 265.860801] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 265.868125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.876763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.885425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.893479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.904064] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 265.910147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 265.927384] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 265.940020] 8021q: adding VLAN 0 to HW filter on device batadv0 03:23:41 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@multicast2, @local, 0x0, 0x3, [@local, @loopback, @loopback]}, 0x1c) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local}, 0x10) getsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000140), &(0x7f0000000180)=0x4) lseek(r0, 0x0, 0xb92a29317f9ca31b) 03:23:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='\x00\x00\x87\x00\x00\x00\x00\x00') openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) getdents(r0, &(0x7f0000001240)=""/4096, 0x136a) getdents(r0, 0x0, 0x22f) 03:23:41 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000180)={0x0, 0x6, 0x1, {0x5, @raw_data="efaa91e861aa9431ed1253263499a0b1b370c43f9fe8f2927337a7d398c6845cb38171589b15e8d8b61dc2e54209994fec0662ed54b2baa44404f48509356f73689ffee8d5b5900744889c501420724ea72c482a9e0dd0fa701629106ab573c94c82fa974e2cc0b74e5eb5d3df1eda89581c045ae28a41b014d328db1ec69773717d52c347e1ab293032682811cc8c1a943e4ff99d6413e857409534cbeb3d5c2cef8143ea24613061aca7b83d6a2dbb623aa0cb7093e6818c917710012a3be504412cf3dc2dc008"}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, r1, 0x30, 0x1, @ib={0x1b, 0x80, 0x2, {"fe1d67e78c82c0259e2be23ff4b4ee36"}, 0xa60, 0x3, 0x9}}}, 0xa0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1e, 0x2013, r0, 0x0) 03:23:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001440), 0x4) r1 = getuid() fsetxattr$security_capability(r0, &(0x7f0000000140)='security.capability\x00', &(0x7f0000000100)=@v3={0x3000000, [{0xe767, 0x472}, {0x8, 0xfffffffffffffff9}], r1}, 0x18, 0x3) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x402200, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000080)=0x2) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f00000041c0)) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) 03:23:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000003c0)="230000001a0081aee405dc09000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffff, 0x20000) syncfs(r1) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000040)={0x0, 'syz0\x00'}) 03:23:41 executing program 2: r0 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="70f83bf16120f9254fffa440524e0e8ba86a777df4c6d6cad09bca7ec37029fb06c88b9f4dd03ecbfd445359c26737c16c7a11ab1d48520d9d642e252d35608fe1868a91b026a0048be4f0bc25f39b700949d75a738e56a5b553f3c32e98e59d3aa2e88e96f1dd8e70755752daffd6be5c301205d511c9bcfc150a9ff6b1952965198033a649aa5bf52f3a1fefc41c1fc8a075b130a9d0f7decd088cf1d6d3d885b05e556e87dbc9629065e0d4a849773d527aefc74c490e7566069fb9e31616232f16b9dd79cc59e2bdef3e54626a5a61e68fcc51", 0xd5, 0xfffffffffffffff9) keyctl$describe(0x6, r0, &(0x7f0000000200)=""/149, 0x95) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0xf, 0x0, {{0x0, 0x1}}}, 0x18) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x40000, 0x0, 0x0, 0x700) 03:23:41 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffcee, 0x0, 0x100, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x5, 0x0, 0x7ff}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) fcntl$setpipe(r0, 0x407, 0x0) 03:23:41 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = socket(0x0, 0xe, 0x4) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000100)={r1, r2, 0x200, 0x2c, &(0x7f00000000c0)="e9714c4541606cf0a7addc94e1c1432e7495dcbbb96c3e44a19070343a517b338f38f3525030ead939cfff3b", 0xc235, 0x100000000, 0x6, 0x7, 0x81, 0x1, 0x2, 'syz1\x00'}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x6, 0x4) 03:23:41 executing program 0: r0 = socket$netlink(0xa, 0x6, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10d, 0xd, &(0x7f0000001ffc)=0x2, 0x1) listen(r0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x22202, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x100, 0x0, 0x40, 0x400, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r2, 0x8}, 0x8) 03:23:41 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/134, 0x86}], 0x1) tkill(r0, 0x1000000000014) 03:23:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x232) r3 = dup3(r0, r2, 0x0) getsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x2) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$int_in(r2, 0x5452, &(0x7f0000000000)=0xfffffffffffffffc) sendto$inet6(r1, &(0x7f0000000040), 0xfe1d, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040), 0x4) 03:23:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19}]}, 0x0, 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) write$binfmt_elf32(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x800, 0x800, 0x4, 0x3, 0x3, 0x3f, 0x80000000, 0x2c6, 0x38, 0x221, 0x1, 0x8, 0x20, 0x2, 0x80, 0x43a, 0x3f}, [{0x60000000, 0x10000, 0x101, 0x9, 0x20, 0x5, 0x3, 0x80000001}], "6a1f7039fb5c3cac6d9bb679ff14029d03d4ae8ea43e26e3e3923051bf9243", [[], [], [], [], [], [], []]}, 0x777) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000210007041dfffd946f6105000a000000fe0040030000080008000a000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:23:41 executing program 5: r0 = socket(0x11, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt(r0, 0x107, 0x5, &(0x7f00000001c0)="010000000300060000071a80000001cc", 0xffffffdb) setsockopt$inet6_int(r0, 0x29, 0xa, &(0x7f0000000240)=0x8000000000000000, 0x336) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000080)={{0x19, 0x5, 0x2, 0x97, 0x7ff, 0x9}, 0x5b2ed417, 0x1, 0x100000001, 0x4, 0x3, "d4d713f15ab65929d1ccf68a9a46bb70fcd35f6c34b929aba915a7c456913800bfa42081c209e67955d070b0d3f3a6f1501de7078e4eaf50e03d8cb592954c7d7ab67e82ee33e815642cb07e26c25a953e26c784447323740a81be835447cfe3b08e333e2de50b41e86e6ee2f6cbe4a44fd1a201655d3d631cfab57d68f795c7"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00', 0x100}) 03:23:41 executing program 1: r0 = accept4$bt_l2cap(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80800) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x80000018000}) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff53, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="21243cff603502000000000000587f3e96820b9f17b2913300"], 0x1) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x40000) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x7a, "1ce6074076a2ac06bfa7540962d33e452f6caf0bb31bc7942dbf1de11dbf364e50baf1b3a4fc2f71d26309d9959cd4afec9039e6c01a90d5573dbd04734a400c8f952dd234a163dfba86d75b541337cddc806254f9fa11514eb79e61621b19884c7de91d2e8f8d85887305cdf33f997ed03090220fb10fd61b15"}, &(0x7f00000001c0)=0x82) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000200)={r5, 0x8, 0x1}, &(0x7f0000000240)=0x8) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 03:23:41 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000380)='./file0\x00') write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0'}, 0xb) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000002c0)={0x80000000, {{0x2, 0x4e24, @remote}}}, 0x88) r1 = creat(0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x6000000) prctl$PR_GET_FP_MODE(0x2e) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$tun(r2, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f00000005c0)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000001c0)) [ 266.412903] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 266.428359] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:23:41 executing program 2: r0 = socket(0x0, 0x80000, 0x0) finit_module(r0, &(0x7f00000000c0)='$posix_acl_accessuser]em1\\ppp0md5sum\\\x00', 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x10000000000, 0x7ffe) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x8, 0x100) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@local, @local, 0x1, 0x2, [@multicast1, @loopback]}, 0x18) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0x40405514, &(0x7f0000000080)=ANY=[@ANYBLOB="a94ac59b0b120d8b10000000000000"]) 03:23:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x800000000024) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) write$P9_RAUTH(r1, &(0x7f0000000180)={0x14}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 266.681400] overlayfs: './file0' not a directory 03:23:41 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0xc6, 0x6, 0x401, 0x21, 0x0, 0x7de, 0x90770, 0x0, 0x80000001, 0xffffffffffffffff, 0xee6, 0x2, 0x7, 0xb90b, 0x5, 0x200, 0x3, 0x72d, 0x7, 0x101, 0x101, 0x0, 0x4, 0x8, 0x5, 0x4, 0x2000000000000, 0xfba, 0x7ff, 0x5052, 0xa7, 0x5, 0x7f, 0x1, 0x20, 0x10000, 0x0, 0xffffffffffff0001, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x28280, 0x8000, 0x1, 0x7, 0x1, 0x66, 0xffffffffffffff84}, r1, 0x2, r0, 0x1) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local, 'ip_vti0\x00'}}, 0x1e) sendmmsg(r2, &(0x7f000000d180), 0x4000000000000eb, 0x0) 03:23:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="d3abc7990d535c000000004e00"/24, 0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x5, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB], 0x500}}, 0x0) 03:23:42 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:23:42 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x8) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000), 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x5}, 0x10) 03:23:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(0x0, &(0x7f0000000200)=""/112) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = syz_open_dev$mouse(0x0, 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') fcntl$notify(r0, 0x402, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = getpgid(0x0) write$cgroup_pid(r2, &(0x7f0000000040)=r3, 0x12) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:23:42 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000000c0)=""/31) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000000)={0x20, r2, 0x701, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) 03:23:42 executing program 3: mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x0, 0x7, 0x5}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimes(&(0x7f0000000080)='.\x00', &(0x7f0000000140)={{r2, r3/1000+10000}, {0x0, 0x7530}}) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xef}], 0x3, 0x0) 03:23:42 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r2, 0x701}, 0x14}}, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x321) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r4 = openat$cgroup_ro(r3, 0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$SIOCRSGCAUSE(r4, 0x89e0, &(0x7f0000000200)) sched_setscheduler(0x0, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000001180)='./bus\x00', 0x0) ftruncate(r5, 0x208200) r6 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r6, 0x0) r7 = shmget(0x3, 0x4000, 0x78001040, &(0x7f00000a4000/0x4000)=nil) shmctl$SHM_INFO(r7, 0xe, &(0x7f0000000000)=""/15) preadv(r4, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) [ 267.501161] audit: type=1804 audit(1556594622.545:53): pid=8461 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir422954848/syzkaller.I5fNhb/21/bus" dev="sda1" ino=16597 res=1 03:23:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000001c0)={@multicast2, @local, @dev}, 0xc) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x1000) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000240)) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @remote, @broadcast}, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000003440)='net/mcfilter\x00') setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f00000000c0)={@multicast2, @local}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x0, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000180)={r3, 0x8}, &(0x7f0000000200)=0x8) readv(r2, &(0x7f0000001280)=[{&(0x7f0000000080)=""/57, 0x39}, {&(0x7f00000010c0)=""/151, 0x97}], 0x2) 03:23:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@v2={0x0, 0x3, 0x5, 0x6, 0x28, "ad6bfff4cba761f2cc9e2e16b550cb446c152a4b28d850867b905f3ef570be9876a150890950b0ed"}, 0x32, 0x2) fchdir(r1) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) [ 267.659052] audit: type=1804 audit(1556594622.615:54): pid=8461 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir422954848/syzkaller.I5fNhb/21/bus" dev="sda1" ino=16597 res=1 03:23:42 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x101000) execveat(r0, &(0x7f0000000300)='./file0/file0/../file0/file0\x00', &(0x7f0000000440)=[&(0x7f0000000380)='\\#\x00', &(0x7f00000003c0)='wlan0em0system\x00', &(0x7f0000000400)='ramfs\x00'], &(0x7f00000006c0)=[&(0x7f0000000480)='ramfs\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='ramfs\x00', &(0x7f0000000540)='ramfs\x00', &(0x7f0000000580)='ramfs\x00', &(0x7f00000005c0)='mime_typemd5sum\x00', &(0x7f0000000600)='ramfs\x00', &(0x7f0000000640)='\x00', &(0x7f0000000680)='ramfs\x00'], 0x1d00) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000180)='../file0\x00', 0x2) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r2 = getuid() getresgid(&(0x7f0000000080), &(0x7f00000001c0), &(0x7f00000002c0)=0x0) fchownat(r1, &(0x7f0000000000)='./file0\x00', r2, r3, 0x100) link(&(0x7f0000000100)='./file0/file0/../file0\x00', &(0x7f00000019c0)='./file1\x00') 03:23:42 executing program 5: r0 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000002c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x80, r1, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xd2d}, @SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x5, 0x8, 0x5, 0x78, 0x8]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x7, 0x2, 0x1, 0x1ff, 0xfffffffffffffffb]}]}, 0x80}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) write$apparmor_exec(r0, &(0x7f0000000300)={'exec ', '$md5sum\x00'}, 0xd) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f0000000080)=0x2) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:23:42 executing program 0: r0 = socket$inet(0x10, 0x807, 0x80003) seccomp(0x0, 0x1, &(0x7f0000000a00)={0x3, &(0x7f00000009c0)=[{0x5, 0x4, 0x7, 0xce2}, {0x80000000, 0x40, 0x80000001, 0xffffffffffff8000}, {0x4, 0x1, 0xa75c, 0x1}]}) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x4, 0x4}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)="49f3a6ba7787bfd30ffb1bbde5e9acf2afa5c2c20383f106321525b767e7c58123b08bc2de854ef64dc150ce79dfc614e15901a9f4ab5b174af6a8577448615f4724d7df20a12c396d68fe1d4f63d80a3e68981ab9de2aa41cf7006276a7b5fdd31246e5ded11b4b3470f9474b8149b1b7bc19a39dcc4c540597e3c5231e1468d607ed9756eacf7879955990b9e0e6da02b69bae25605ec7fe3cad43bd308aa48827b0566f61b916c77cf65626c2fbecc56f514acedf2515dbd3ca667c1ef43d4c7515368f89d0c75af1b240655b02fa2c3501a203bce44c52e67ef0a6735266de1da605727d27deb817", 0xea}], 0x1}, 0x801) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000980)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x12081000}, 0xc, &(0x7f0000000940)={&(0x7f00000005c0)={0x344, r2, 0x700, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xf0}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x101}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe780}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x876d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5c4}]}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc0d}]}]}, 0x344}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f00000003c0)=0x184d, 0x4) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="71019d00000000003ea31ab8fdf6072a299d9c48a34a9d80ff901ac922bcf154eb2f3ed6bbad50b498a032762fd21350976fd282e12d7f4282cdf4c1324d4d656bb2eafb0a3d671ee5a0", @ANYRES16=r3, @ANYBLOB="000825bd7000fbdbdf250e0000002c00e202000800080006000000080003000000000008000700ffff00000800050020000000080005000800000008530b00060040418f5046000000080006000002000008000b3800"], 0x58}, 0x1, 0x0, 0x0, 0x84}, 0x40) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:23:42 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00\x06\"\xce[\x94:\xc1F\xd4\xb7^\v\x1e;\xed\xc1\xe9\xd00x0, 0x1}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000001c0)={0x10000000000000}, 0x4) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000200)=0xd0d, 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000180)={r2, 0x80000, r0}) ioctl$VT_ACTIVATE(r1, 0x8910, 0x70c000) 03:23:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000280)=""/97, 0x0}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r1, &(0x7f0000000080)="393e02904060b3d6d59f81769b9f2ad9", &(0x7f0000000140)=""/141}, 0x18) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000017c0)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, 0x0, &(0x7f0000000580)=""/156, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000003c0)=0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000300)=ANY=[@ANYBLOB="0100000000000000d38a59e70000000000000000000008"]) 03:23:43 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x4) r0 = creat(&(0x7f0000000280)='./file1/file0\x00', 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x479, 0x4240, 0x0, 0x2, 0x7, 0xb4, 0x7, 0x4, 0x1, 0x1, 0x8, 0x6, 0xd1d, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x5af, 0x825, 0x3f, 0x800, 0x7ff, 0x0, 0x0, 0x7, 0x20, 0x80, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x12, 0x6, 0x3, 0x0, 0x0, 0x6}, r2, 0xe, r1, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) prctl$PR_SVE_SET_VL(0x32, 0x32dde) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') acct(&(0x7f00000000c0)='./file1\x00') getpid() dup(r0) 03:23:43 executing program 2: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000000)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0xfffffffffffff976}, &(0x7f00000001c0)=0x8) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$get_keyring_id(0x0, r2, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x4e24, @multicast1}}}, &(0x7f00000002c0)=0x84) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) setfsuid(r3) bind$rds(r0, &(0x7f0000000480)={0x2, 0x4e23, @broadcast}, 0x10) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x22000, 0x0) utime(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0xfff, 0x1}) fsetxattr$security_selinux(r4, &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000040)='system_vaun_t:s\a\x00\x00\x00', 0x13, 0x400) 03:23:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe10) r1 = syz_open_dev$usb(0x0, 0x0, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe004, 0x0, 0x10, r1, 0x0) mremap(&(0x7f0000014000/0x1000)=nil, 0x1002, 0x2000, 0x0, &(0x7f0000008000/0x2000)=nil) r2 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000400)={0x1, &(0x7f00000003c0)=[{0x6, 0x0, 0x0, 0x4}]}) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r2, 0x0, 0x102002700) [ 268.429966] binder: send failed reply for transaction 2 to 8499:8500 [ 268.452968] binder: 8499:8500 ioctl c0306201 20007000 returned -14 [ 268.465862] binder: undelivered TRANSACTION_COMPLETE [ 268.479909] binder: 8499:8510 BC_FREE_BUFFER u0000000020001000 matched unreturned or currently freeing buffer [ 268.490732] binder: undelivered TRANSACTION_ERROR: 29189 03:23:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) r2 = accept4(r0, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x80, 0x80800) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) 03:23:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000002, 0x10010, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000040)={r2}) bind$alg(r0, &(0x7f0000001000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r3 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ae", 0x1) sendmmsg(r3, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0x80, 0x0}}, {{&(0x7f0000000080)=@hci, 0x80, 0x0}}], 0x2, 0x0) 03:23:43 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) syz_emit_ethernet(0x2d0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x2001, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x26) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000340)={0x0, 0xeb, "bee0b0a90671879dd5ad41cebb633b25d23b3a8fef93135fda88e6f4c8d856ae39c8cd1d50868c923589b5ae14d4bdbe61c8b7b541a29313e6e04dffb51bcb1b4ff84e4e412744d3f206eac035db00bbe8da03ce27e864d89390ce3443b0ab981773af3e7af9ab63d645d60aedb070e9a1962a08bfad0e2b09f61a10ff3989999966f9cac2d3d5fe59755927ac15a1c5cf91f3eb0c58e37b56af6dc114f99cfdfa9e972a3d36c1c8d02434da83af7394cd89461c02202014bca77e885d26fa8adf74cd95bdfc6eca1baf6823705c5a977f726fd3c873084c4f7e4acbf6e0307fb23e958cb851a0b46ac854"}, &(0x7f0000000440)=0xf3) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000480)={r3, 0x100000001}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x2c, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0xb}, 0x6}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000300)={r4, 0x80000001, 0x9, 0x6, 0x10001, 0x3}, 0x14) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x2c) setsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000001c0)={0x0, 0xffff, 0xc000000, 0x8}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='gre0\x00', 0x10) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000040)=0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000000140)="be9af32ad030f9935b209603ca3c3ad5259c76f689b43cdb4e782093a51e5e13217284420658898163699ba68558857806951a25a0e7c7f5c2ae5965c22bb04a97912c99a6587f121b119a5fedfdfd8cce", 0x51, 0x3e8, 0x0, 0xfffffffffffffd00) 03:23:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb0000000000000000000000000000ebff2a000000e000000100000000000000c70000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000a9fc00000000000000000000000000000000070000000000000000000000000000000000000a000200000000000000000090a527f823cdaf8bc5cc7278f187a2e6513a0400c53d857244b50fa3e5b55df85f4929ec93ab6b69f517326b797a3a1ad1915228deca22042ccc513423b4e459a17f7752d92ff5d680c8243859775aaa5cf44f351be504bc7a915374ded2c35a5eac7149851d70ae9f9aa450440b9311a8f1467951b86c1eaa56aed8c05c12a8dfc7e8ce630017617cb7bedffbaaf1ffa2adca251d19a145c92b1b8462664e80f240e4b2317190f501551d053c5dea1f87331fd84d1084b1899ef7671d4f25c9802b90af5fbab8a24a15754505d60ebf74da64000091cc247cf5072fc7a460f0d76f7fd19ddeeda779beae0d4ebf4b71d21e43a5e022a95b0d09895dad2ee49252ab6b2b0e80da013b737270b7b619ce3cb1a417b692f801abda79f37d70f46c2bf4a997abae99c02755319a1ded1c66a2a19138de78a5900ebe4b3b89391eb8d07988f2a204b9bfa95af691cf44502c129427cbf64e7f217772c733cb0fb49735fb92e5d0659b92459a44c9804ae79ee9310a753cf9409d6142eee5e842739b3b44b90b96753da4d886c65e1a06d56f134b3469c397035491934d09940d2d4eb8f7a408dc9446f4bc1ddc516a7c59dcc12aabb8ec0fc4b415af375a9d80721d1c633851b91b465bd7e5ed3520a61790f871d85b80362181ecd976c5f8e9afa2be95d206296f85eac8b04001ed6679f4e64490eb4604585db061921f105830f17c332153b11c29b6ad6b2bb2f7fedaf4e310d0dc755b9eed0339090922fc271db556e6f8d368086bf2b82a654f4d5468cc783d55c0a047fc5273f6cb43b610790fab626edf1c6da7fffc1809d2478a3d3bae464344ffa046306850b2c99ba5feed14e0638730b699b5bf3d11bced1ef97521"], 0xf0}}, 0x0) r1 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0x7ff, 0x40) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000a00)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000680)={0x31c, r2, 0x200, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xdc2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x322}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1400000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff00000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}, @TIPC_NLA_BEARER={0x11c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x386f800000, @ipv4={[], [], @empty}, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x14, 0x2, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9d6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff7}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8d16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x371ff7ff}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x800}, 0x20000080) [ 268.636704] binder: send failed reply for transaction 4 to 8499:8500 [ 268.668109] binder: undelivered TRANSACTION_COMPLETE 03:23:43 executing program 3: modify_ldt$read(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x11, 0x9) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000000)={0x0, @broadcast, @empty}, &(0x7f0000000040)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0xe}, 0x21, r1}) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 268.707561] binder: undelivered TRANSACTION_ERROR: 29189 03:23:43 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000240)=""/129, 0x81, 0x0, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r2 = socket$kcm(0x10, 0x2, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000380)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x5865}, 0x0) ftruncate(0xffffffffffffffff, 0x8200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x4, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x1) r4 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x20000000ffe) fallocate(r2, 0x0, 0x0, 0x751) 03:23:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) sendmsg$kcm(r1, &(0x7f00000014c0)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @remote, 'gretap0\x00'}}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000100)="8ef55e2ea4375609c07e58b441240ab9b347a17da8a2213d18d9e91265af7c2033eab59cd1bfae33aabc5e06aad468a511061056df339271023b2a62c9b3603ddc0da50f19646f6fbb618874101af0b4cf3431307e07f45438931ace487b8d522394484a4361e929aa0423b09a2cf78ea057521c713f656a6e11ca2605a6ff7b8de7ff3d22ec5f76943dbee684273e388ed2e030fcb84d42aa19ca3b064b413cdfcd241ba18e313340d80488f44765db13e3be3658f472d044afaace915a543e91a3b87d4fa29b094909c4be62c974bb72f7a2aed76f6e330f79266dc06f21f2dff511e41b8072f626b4711ebcb812a2b3fd7957e171967af7730c6c7125fd70a09a5833cd485c0a9c432a3e3460c9c64e5ddfe62a757d1f98742d20f137a8b574f5068a142bdfdd69fb99ffde4dcd91be5b7f1f40e828dd22abd3ae482f7f112d9bf118819a9e7d30e2ecd4693b3bfe12894e73ca7c9f9542f79c1763a42d508e571a26f9565da28d0161381fcf082087ad49f65e171ea78b72bbd9f23dc00a7480a552d18d0b81b9675f19672dead26d94d2c072feed1b5f6e408c0e6d8c17cb1fa11574ac64e65a1dc908b5fff7a41325a32f0852ff1ad5d6030d48a25690e40afecf35917e0c6aaba87491642f539707fcdf2a644460d8dbfcafcbbaadf011226464c2d10c6b2dad1050abf731eac30329eb68cbf307c3b0fa8d21dcd9275e5a7c01b5086c205a6c41a2296e93c78c4f037ba329a3f4890eb3fd06a8691515cca7aadd0aa5fdd1d609bad843d85c1f3c499a97f3ba5d73877ab2dbff76aa3f39ed70aa7a045b494c830f9b01aab36ef2002a98cdeaaf864d03861addefcaf371b7f3aa218660149babde3c6d5de19730d4c3c81a94757c7613c6e89bf03b0a3d491ab50d4bc964ea7966ad5ae2d21085d7858563fe0dbce4c929cdc86ac7e012a3eb24e26da87ce8e351a6fe215b4bfd50201c68019d7974ec128443511b385b70e790f17ba91ff8879e393f30f6e837276f0f9bfcec1e35d2ae1b90dfbd3a97441fcc89dbd89d96c181d709f23cc3f252611d0f13b785f7e9169cec3411b7e81fcb7a99ff34e0c739efd586b8ed0a1d91d4f628d8b0cf053bd2fd7ead256a44cc521e3e32ecfd4dcd15c77b63db0db87a7e1a4b3eb476f744ca2af936b8513121651a0aeae012e4a5366beea129a8b991cee240f5fcce56b9f43598724a4dc725ce73f4d786f3b08c38e7e3a33e27d257e26828401ed442bb9c16e523d2d79dbae9efa7f8fe711576f114b52dae968a5d8903ddeb6e753798c2952d6b106d029d582024e12eefa8b9336408c67c502e866e68c478b0a0190046f6d44eafb3662349767a0b8e9edbad0ce18c63d9c88252cffeaf99061bdbd279dbfa4aa4778e89f9fd1a1cb6537e4e3adc06634d520d57b71db9a53b47de22cfee6420be5b6507c70e81f66dd54f009f15939047365b17271d79b4d40ae3d481912b179df808edc7667435435c7879cd372cd1452d6724f6b7639e0bc7f9fd98d0746c75fe721d3d4f27b66b628648efc25be4f9bb7b1c89310e11ad900d72c6134415008425bb46d64e6150680ff8e363c95ffe995043c8f716e86095a6ae92e151f9b90ace7c34ec0e2511f5defc93e0ee41430f203851dda9046b85ecc851f18b606ce783fb0704073934baf84634c33fe1da026e2c36260ad4687cf32fd31154d2baee07213090ef248c4b4bf73cb454b6e6e08829ec640bf08805b1a195a7d2c76e16129c08dc4a78fef0954180d4becc5a2a4e140f5dfb27d99b1da71b0246cd4360f5f97b9a8b6222232a30c9ce0fc06cbcac85232f0f1e6fe2c16184e267afc9a3a742a7199922d3cc92820ec1c222ffd42078fc63626153782e27955d17ea0cdc7186f080923b3ca1887bd5a2c3b0306750d33a4d63de3c634b9de4dbf66c9ce1db4697223043f175cafc474ccc32201e16f9b16fafff3055a4e2f56110efca4366a262072a02e5ae62bc760d442c0772854d97802ac39c093aa9268d16a693743086525cc78a16502b22334093b508267852dd48fa03078a74ed7ccc368a2ea1273c9f2afd91c719082c17b7b492f98c46e98a58d10df9ce06e70e21d8268d839a7118935c0a619e7ca3b64bd5805ef9739c9fe5c8b8ed358957d7ad3fce3a5cc8a734333e2a178254510c24c9c31d72e764623f133b023b2371279e1cbf73d2dff5fc9e3b9ebc4a90cd43104640784bf5764157b39f3eaf9e0b5d090b66998e5e1975178019b4d1c768039cc0653c1a3329a4a925ce821ac4586a39c3810c956f17e1bc43d1b38b63eab2786c3da3f7f9036410d6044dd5494b8e7363692a290bde6025a4f25ba9cf71192233551c31675d59c5a535c9dfacfb8dea7aba2b798fc29dbe3796252251296b827210620e91b9b7616d741a24c2f136785694392de1bf292ba94a6c17835750452c35247fe5f034b5135e266ec79b0d68b16e9dc8097ad6987ee303d7cb9ac8fc631b36aebcec4ec298c88f4d66ce9441ac4168e1f57ba1a71ffc73e67bbd1b168e19d0a989fecd3f08a7a60bb1286260f784b1259417f55164a0874d3360257b54039ffbfccc5a078ec3a46dec267515d8b4578ae7fd538bcfb18fd4f11edf1cd56691e8a26d77713e59b4d278e36b496904c63213afc4300c47f1ac4b8e267af92f3db81a9247f1dab2b475ece8cd1a2735e14a3aa11dfd33aad1e058580d5095633e4aa10841c387f86a89d064cf300c40318eb857deec01e2d7525b829e509baa227c4cca0f009d73fa71c0350561ee0ef23d5528dbe7a45fe9e5200a3d02ab76b25027922fd92ad99f11f978b86034f6788a2248f85fb8f90d892b3da95295b8e02316a0fb015b1aec3d80f228dea3f68f66340e48154caf18ba709a0e28f6b568e034d2c39bab2787e7d3f88951a0bdbbf8e52929cad0d0c0af37c8e017f3f110f70f1e70c65f5d6f8e354182fda2e1873a6c155fb611f0612011a3724a9636aecb2787e31b43bde6192bc8cc1fea10c3598fd7a0b59b56db09238507350d8776ad9775efd76c0e83151e722c43396d021dae1631838f97fd444330f8135aa081d6c17bf8d09c725970ecb66118b72ef19c64171fc1dc3bc932f1d3009096495a64b85d0103ba83fd9caac5bb61d1a73f91942e8652d250ff5d5b73ae729f9205eb40ba39b2ecf2353330af7da16bd59fbd2e88b8d3cb85826e82139aecb55127dfe87c0d9e9481d9b985b828230cc03170e5b35f3298813d3e67ec749aee0605201fec70b68967d3dbaca61364bc30e249a05dfe6ce5183e0a3e233db687c53ca1e91adf3c29f73f884a4430918590b91a72e6b7eeaa62343a28fd3ee619d88f4326bbd7f77fa13ec8eea5e41e8cfe18a346c82f0218b6a462d647df5a39bbb94c575c16a95c41618d3186e6ffb9bfad0ac48cc75377f35cb67644ee8046d969ffe9081ebf463305ea6bb845d1c7b22a69d41406c8822c464b8fccd2377e48179409db885e1a910e42155c1d6a945c7c6e147c8d0e4bac30482ad03fb5910e605a24db1f600586c6eb46288dd6a780dd3f8c5eb76d5cbdd28e8b3dff1204aa2041c66f4b3fcb360f52d35244a72ce7dfe037c6680e806cd4343b2308c3cd2f3c7e3af5b4fca692f2fd736c4d63a8e0445b49fbd41516724cf3e5eaa9bedb6e800adccf37294685293783f78472acff4f5ee9e179973536806ac5f396c54966b4cfbb6ee7130896a0b52c51dce1dda83fc4526ed023a6985cae62fccddbd3f4df4d750963da29a09d775a60998017f5b49f768026e7791df19855119dd9f0c9b7bc28355326b0e68292f8f8429062cd13d51448bf30afa854168ddd03dc07757d51f1b72f4a86694672135bebbd4741a1a66caa9124b4f69a32c71c912af20a0913e40353fa1dcfc24eba57137923942c0e70555eaff703cb091c3f3be77629569ebb842e54dfb52dbf44ed56b741f6468458e531287b95680126d4e2daf1874b973e39ca23927d087efaf785da6b0dc0d0acc048864da5f04e7022deecf5aecb851582adc0074ba57ca3638b15937a2caf9294a302afc9f4ac4a1de33ac3d4df38daf77f0e190ff00623ee16a3867bd699831aa07f9546d407a1a1ebcae8e2c95fb1c2245a8a7a73085576618a0bb63e7fab747648f368aadc9b9816204554969eb956bc50deb8a53bdd86a3236aaae42aa3e023fd89e521aa9036de5b69f2103990eb403ed2ee7042bb72fc90da2019c41920ba48002acc1cb9f3b62478008ef9028353ee661583ccb8ad1b4be99f14cea0ab57cbee79863892a8d75a528c9315178f15a5e3fced36c16210039aa0922bb2c14db1812601bc8b1624d500588b4f5fe1434cb98ad77e5d433f76366df56013cb4816d0c3c5334f3aad17e9cb67e4accc214d0c13913677fdf8866dd3ee58e3cdef0a7ddad931baa37590bfb4bbf21eded46f39be1cc7fe8fc51021a3b416ff4306007aee442c2a2cb2e4d3c2f9108f3717461287434874ef0494ab2c3e135a85d73accd66e59f3ff343cf88cc11a4fe29dbcce1da02ed3200bc31f95b37f8033edf2865f236b2e744cec891e7a9f988af32c94299b4efc6c18bb04a8b762a8610ee7d62e9cd33f894dd084b96d8fce7dfbe3e89ea2277d5273ce192d9f0579296acc0b57aed9de56870c15a15c3d03f4d108b2700c7e31d4393a276662a75ed6c0c54e37127b14c53e187917f284e2e20bd31bc798151876d36c17a1fef7faf005f84253bc9f9aef6d31803f81d96367c665e59211808a63b3d0ab15dad83a0b7b1951d81cad75b2e56eb0c471a9dc1121cfc0ab991e1f115ab787053814d850065004a2bf429ce069b6976d3bf250c967987d836c3e23af061df19392a6d1d7bd64eb02d6b46b53dcfa4277b154950845df86725311bc7e14c8b7243b54aff2e44c86c2c9ea4cb65ace97fecd8e7700410702776546594517d2685fb8fdba390a897369313defe737009ece086825cdbb98614a37f249a0135986c239180344c5ee4c937a3dbf9472b922b0cc595b36794985b0928b5f8179f2b6f9cbff1e27f15aedd31b9cb51030a32d389ff3939f1592b3be79ceed1055183992dc0ca49c2a0cfde7e45208ce9b4c6ca69b017a4dde6b0ec51f754db63b57d0950e2284bb33b4df6bcba42862bd065c3e2bf2674fb05e163f0ede0f86b67f0e43ef246a2ac3a3f5c167253544e65a10125598f51c9cbfdadc201d85db569f248ccd4ebe98e0375c42b6bc78d1c6f0e959783f73f325ca777c384db263da49cd30cf94218512c3ba60a40eb4320fd37c72175a3283621e0ba28ac87911c67b724c15cdd17d00bcf546a390730b2aea9562704734d17f1c10b6b2a62cf37ce22ddde162edfd07886fcfa42af17edd0ce548dd88faa001940becc14d5ecb57924ed6304c8c492900a8a81bc1ffac6e02103098648a1254868489221709cecb344ce49a4754a186ecc15092b8583be0d9d1a621aa89a08013aba00f62a47c9cb57a0bab142ae51aeac3bc9ffecbd4c350f92cd3111655c3e524ebe9fc79629ce46cbee689c92714fe9629ba22a34d9e309701c7d10776fdde6a8ed67f9c08b0fefc0e0a4f89fb14de13967bbb0df30cd7dfa66531b685fec5c96dc2401f2ca17105c431b24aee0c76a2942aae0097d18a0e3fd9aca64355d26e547ec31f0fe996d9b586f0aa38d366c0cae426a8e3c85de8ad3f669738167d406284c73f7a291c7e2808411ef2366b1fe66b1df908eebe59de31776b33dc8efbc2e060a905479431219c", 0x1000}, {&(0x7f0000001100)="ed8756d5d60d04b899ee911c64a74cce512b770eef7407177fd662c92d539d959bc7efb5c611ff40ce6a02544cc0140f3ae836f842db596b94679c0bbf25ef4f8fcca626decff61735bf664665074ba42ea09a5547fe7f44c67949c42cf13808b0b1b93f889f0ca905c91c0cb27928debac7bd0ff8a833f865d7c2730d6c6e3283fbc64fe0de4e38551ca49710859c676722a4330bc972484bdc6cedc8eaece939dd309412eba2dc32feb031b69901fb4d23b5b1723934b617e0cefd6344d669e64a94d579b3070669f9a92e4d7c0c47f7ae43e0e86a01ff82edeab6fcfdff", 0xdf}], 0x2, &(0x7f0000001240)=[{0x10, 0x115, 0x2}, {0x30, 0x118, 0x2, "80d452bbef297253fc7ef697ef9fd09593b8d9c306487cce0fddfdf829"}, {0x48, 0x84, 0x7f, "254d8b47721b9e638031021438d21062251db2ab7ea25bf2057b23fc47e3b73abd1c98a9b7db23335a36777aaf7993bac5f0e39bb868"}, {0x60, 0x116, 0x200, "75a4d748b51747abed47d7a9e229b7038c8e343adb56916dd8dd51aeb753061aafca7b174fc850e313d2377ee41e960cef452e9bd6b1855beaedd02850ac3a6ab7512adf4331d79d359844093fffde40"}, {0xb0, 0x117, 0x8, "bd96ba7fc016fae44c70d41586d3e6afe195cf6bbbd34850d96a5516bcb8046608b37dd67721250a45be9cf55d0dd7629350e7b282fd3c39e083373e293a7870d7a6a9b16a41ba6042120534b5525e60fac9d51996515164eb6e63f0a47c4fb3798d392606e343bec30e064634e7291cb9790d816f3bcbcba9f6e2deddaa4e803c41142f555b88d192e9bf55fbf3397dda795a236d9aab936c983bcd39a1"}, {0x88, 0x114, 0x200, "78f4343d3ba1fa3ddfbfa2a11ce6382a1e5e2ac4a9a0d735c64c9e537eea01ed55d13c43e0a6fa776816559701735a2b21bb777b6e423e090de69cbbec5579a5a89d91aa54168d57f8df9957ec802742b01b64aee109363137e7f061879c50b99d345309deaa6f10e35d7addb7f34418070decaba923"}, {0x28, 0x115, 0xfe9, "d4a9fe18381a3ede44ca3e51870e3ea9ea44"}], 0x248}, 0x10) close(r0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendto$unix(r0, &(0x7f0000000040), 0xfd1b, 0x4004800, 0x0, 0x0) 03:23:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000400)=0xffffffff00000001) socket$inet_dccp(0x2, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) r2 = memfd_create(&(0x7f0000000000)='\xac\x01\x00', 0x0) ftruncate(r2, 0x1000000) ioctl$TIOCNXCL(r0, 0x540d) sendfile(r1, r2, &(0x7f00000000c0)=0xf10001, 0xeffffdef) 03:23:44 executing program 1: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) sendmmsg(r0, &(0x7f0000003b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x70, 0x0, {"be44c5d4bc4e97b83adaf72a5d755c563c39462de6bf14f1ea09444a69907a6d19495da0221fa83413cf2787e3f6114d94b342667f0cc25d4eaaa22800e768aee4bdcd7d58893e24db59c8b47cd3de553aaa982adb5adb"}}, {0x0, "25394acc3c9b4281567247533d3e82f12f7da6b02a97b80b0d2494ab013e5be18dd4b314835c983a1dcb256431346e"}}, &(0x7f00000000c0)=""/111, 0xa1, 0x6f}, 0x20) [ 269.061217] audit: type=1804 audit(1556594624.105:61): pid=8569 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147812827/syzkaller.pglryS/31/bus" dev="sda1" ino=16622 res=1 [ 269.247643] audit: type=1804 audit(1556594624.165:62): pid=8569 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir147812827/syzkaller.pglryS/31/bus" dev="sda1" ino=16622 res=1 [ 269.248055] overlayfs: './file0' not a directory [ 269.328070] Process accounting resumed [ 269.332378] [ 269.334033] ====================================================== [ 269.340383] WARNING: possible circular locking dependency detected [ 269.346708] 4.19.37 #5 Not tainted [ 269.350250] ------------------------------------------------------ [ 269.356665] syz-executor.5/8521 is trying to acquire lock: [ 269.362282] 0000000054572157 (&ovl_i_mutex_key[depth]){+.+.}, at: ovl_write_iter+0x148/0xc20 [ 269.370146] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 269.371001] [ 269.371001] but task is already holding lock: [ 269.380119] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 269.383548] 000000008c265c47 (&acct->lock#2){+.+.}, at: acct_process+0x2e5/0x61e [ 269.383658] [ 269.383658] which lock already depends on the new lock. [ 269.383658] [ 269.409625] [ 269.409625] the existing dependency chain (in reverse order) is: [ 269.417228] [ 269.417228] -> #2 (&acct->lock#2){+.+.}: [ 269.422886] __mutex_lock+0xf7/0x1300 [ 269.427200] mutex_lock_nested+0x16/0x20 [ 269.431855] acct_pin_kill+0x27/0x100 [ 269.436400] pin_kill+0x18f/0x860 [ 269.440366] acct_on+0x574/0x790 [ 269.444390] __x64_sys_acct+0xae/0x200 [ 269.448871] do_syscall_64+0x103/0x610 [ 269.453384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.459173] [ 269.459173] -> #1 (sb_writers#4){.+.+}: [ 269.464708] __sb_start_write+0x20b/0x360 [ 269.469410] mnt_want_write+0x3f/0xc0 [ 269.473725] ovl_want_write+0x76/0xa0 [ 269.478044] ovl_setattr+0xdd/0x950 [ 269.482309] notify_change+0xad9/0xfb0 [ 269.486737] do_truncate+0x158/0x220 [ 269.491068] path_openat+0x2cc6/0x4690 [ 269.495463] do_filp_open+0x1a1/0x280 [ 269.499773] do_sys_open+0x3fe/0x550 [ 269.504012] __x64_sys_openat+0x9d/0x100 [ 269.508580] do_syscall_64+0x103/0x610 [ 269.512974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.518675] [ 269.518675] -> #0 (&ovl_i_mutex_key[depth]){+.+.}: [ 269.525147] lock_acquire+0x16f/0x3f0 [ 269.529472] down_write+0x38/0x90 [ 269.533438] ovl_write_iter+0x148/0xc20 [ 269.537946] __vfs_write+0x58e/0x820 [ 269.542183] __kernel_write+0x110/0x390 [ 269.546663] do_acct_process+0xd37/0x1150 [ 269.551317] acct_process+0x568/0x61e [ 269.555677] do_exit+0x17c0/0x2fa0 [ 269.559726] do_group_exit+0x135/0x370 [ 269.564170] __x64_sys_exit_group+0x44/0x50 [ 269.569002] do_syscall_64+0x103/0x610 [ 269.573399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.579110] [ 269.579110] other info that might help us debug this: [ 269.579110] [ 269.587258] Chain exists of: [ 269.587258] &ovl_i_mutex_key[depth] --> sb_writers#4 --> &acct->lock#2 [ 269.587258] [ 269.598453] Possible unsafe locking scenario: [ 269.598453] [ 269.604587] CPU0 CPU1 [ 269.609236] ---- ---- [ 269.613908] lock(&acct->lock#2); [ 269.617436] lock(sb_writers#4); [ 269.623477] lock(&acct->lock#2); [ 269.629523] lock(&ovl_i_mutex_key[depth]); [ 269.633924] [ 269.633924] *** DEADLOCK *** [ 269.633924] [ 269.640070] 2 locks held by syz-executor.5/8521: [ 269.644814] #0: 000000008c265c47 (&acct->lock#2){+.+.}, at: acct_process+0x2e5/0x61e [ 269.652862] #1: 00000000e5b33a26 (sb_writers#14){.+.+}, at: do_acct_process+0xf37/0x1150 [ 269.661239] [ 269.661239] stack backtrace: [ 269.665733] CPU: 1 PID: 8521 Comm: syz-executor.5 Not tainted 4.19.37 #5 [ 269.672553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.682229] Call Trace: [ 269.684870] dump_stack+0x172/0x1f0 [ 269.688583] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 269.693937] __lock_acquire+0x2e6d/0x48f0 [ 269.698073] ? _raw_spin_unlock_irq+0x28/0x90 [ 269.702557] ? mark_held_locks+0x100/0x100 [ 269.706887] lock_acquire+0x16f/0x3f0 [ 269.711116] ? ovl_write_iter+0x148/0xc20 [ 269.715251] down_write+0x38/0x90 [ 269.718691] ? ovl_write_iter+0x148/0xc20 [ 269.722826] ovl_write_iter+0x148/0xc20 [ 269.726788] ? __lock_acquire+0x6eb/0x48f0 [ 269.731014] ? __lock_acquire+0x6eb/0x48f0 [ 269.735327] ? ovl_compat_ioctl+0x80/0x80 [ 269.739545] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.745125] ? iov_iter_init+0xc6/0x1f0 [ 269.749093] __vfs_write+0x58e/0x820 [ 269.752796] ? kernel_read+0x120/0x120 [ 269.756681] ? lock_acquire+0x16f/0x3f0 [ 269.760668] ? do_acct_process+0xf37/0x1150 [ 269.764978] __kernel_write+0x110/0x390 [ 269.768939] do_acct_process+0xd37/0x1150 [ 269.773098] ? acct_put+0x60/0x60 [ 269.776548] acct_process+0x568/0x61e [ 269.780422] ? acct_collect+0x860/0x860 [ 269.784387] do_exit+0x17c0/0x2fa0 [ 269.787919] ? pci_mmcfg_check_reserved+0x170/0x170 [ 269.792937] ? do_group_exit+0x2e9/0x370 [ 269.796992] ? mm_update_next_owner+0x660/0x660 [ 269.801649] ? preempt_schedule_common+0x4f/0xe0 [ 269.806405] ? preempt_schedule+0x4b/0x60 [ 269.810542] ? ___preempt_schedule+0x16/0x18 [ 269.814938] do_group_exit+0x135/0x370 [ 269.818815] __x64_sys_exit_group+0x44/0x50 [ 269.823124] do_syscall_64+0x103/0x610 [ 269.834023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.839210] RIP: 0033:0x458da9 [ 269.842391] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.862387] RSP: 002b:00007ffdf8d9e848 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 269.870089] RAX: ffffffffffffffda RBX: 000000000000001e RCX: 0000000000458da9 03:23:44 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$inet_buf(r1, 0x0, 0x3d, &(0x7f0000000440)="3d124163be48831fc8585792d61c7da5132a7d42e5cdf62c8673baf3b8dc1489a230cc8d460dfb188ae9c332f2fd029d75229b5b118d4f05967ffd48f7956ab4d6250e5ffa15080223141319f90d8ab10c4c039df65abdd61b5e5140a20a2231d67f15a31590e3dd00313067add406eec135f36aa45a9512c170ef1279c5ae2a736bc4fc4033e0909397347fd6cf53aaeb80ce330be19a62963c42e972d170c593eb02bd1e0f4852a5cd35bde518f483313d4b0a7dd10602dc", 0xb9) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f0000000500)='y\x00', 0x2, 0x0) r2 = memfd_create(&(0x7f0000000140)='^\x00', 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000400)={0x1, &(0x7f00000003c0)=[{0x6, 0x0, 0x0, 0x4}]}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000540)={0x0, 0x7}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000005c0)={r3, 0x9, 0x10}, 0xc) ioctl$KDDISABIO(r1, 0x4b37) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="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", 0x115, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r4, 0x400452c8, &(0x7f0000000100)) sendfile(r0, r2, 0x0, 0x102002700) 03:23:44 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) 03:23:44 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) 03:23:44 executing program 3: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000010b) 03:23:44 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0xe0000000, @multicast1}, @icmp=@address_reply={0x2b6}}}}}, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x250, 0x200800) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vlan0\x00'}, 0x18) 03:23:44 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x100) fstat(0xffffffffffffff9c, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x8, 0xa, 0x7fffffff, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000cc0)=0xe8) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001040)={0x0, 0x0}) stat(&(0x7f0000001540)='./file0\x00', &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r2, &(0x7f00000011c0)='security.capability\x00', &(0x7f0000001200)=@v2={0x2000000, [{0x0, 0xb4f}, {0x9, 0x6}]}, 0x14, 0x2) r10 = getgid() sendmsg$netlink(r0, &(0x7f0000001180)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x80004404}, 0xc, &(0x7f0000000fc0)=[{&(0x7f00000002c0)={0x2c0, 0x12, 0x400, 0x70bd2b, 0x4, "", [@generic='D', @generic="5c60bf35cfcf2f0d7e6e80a720f3f4c74712937a066f977de6fe05b73d6110bdae5d77221563e0ce2857a040a69d85f07c876a560d01c7f4", @nested={0x17c, 0x2, [@generic="d9d95c788b55374008509808df7bff3ca883fda193979113d6d1fab64396ea6fa0dfa5cda289da05e1749ff33d05ca4b023d2c8a3000b828962cf6c9d298a50532195d3cc0a53d088099602481308367cf1045c085903920070036acd5d51c852c30bba1a725291e027cf97b924e304574cb952fe39bcbc07f", @generic="9153e4962926154028740a757d5b6bbf8725e70738a0cd42db32d079dd808d5d3583237035ef43ffa7b9770835380ba1cdce9100ee7bc24fd09e365b1bd145f3e893e808bd2e4fcf9540e8210008a11a5b288cfc095d205564bffa7c5b131fb2e0f8011c24a7de338c21b3709d4fec4cd616b3ae77dff697aa65716d21a87c07e502c53869fbf5da77057888aa926e33262ca693c662c57cd0fff1660bc09494ea48cb472c3c00aa13a86641dec1fda5a08b6973b73756d290547735f39c23b09c98d607ea927ab8887615ef1f6dbc0ecd103a580dd1d6459bae9a4f8bfea9bec6e3a227cdb1cc57fe67e35fda7aa97c0e5180e83d95c2", @typed={0x8, 0x86, @fd=r1}]}, @typed={0xc, 0x2d, @u64=0x81}, @nested={0xbc, 0x3c, [@generic="cf603b0c6f46bb016b09df32c3d6324b069ffc706c312ebe1cc8f0ca6b3c9e1279", @generic="4dbc2e63626d225988ce57d67a79e8dbe5b4215c53690cf53c34e233977e16a0b780dfe7c14f360bf5ff1e969e85a40218d785525ec1bc2d4678a26670bbae99a928705074fae6245004eab18ec0794adf61e3efcff25cfb76c3d3e133fc771fe45bd308a628644e3adea922feb0cbe5c8529c6f5b1cc3a1cc54855fae73d1fb15bae318aa1af3a6d8cedf599995aca28b7a9d8f069319"]}, @generic="6a4a629bd2efa39f2407883ac61f4babca5260ee8f7bba30d431ed13f9c021c7e26264df0b9e388e3bc09c6b5f05076f54e1"]}, 0x2c0}, {&(0x7f0000000580)=ANY=[@ANYBLOB="480000002a0000012bbd7000fddbdf25558baea760995b136f7c68d74025655ef492d4f22bc81a72e82aaa516af8363f37d2cef5156f86164eff26f4b651b883aee397feef835d58"], 0x48}, {&(0x7f0000000640)={0x34c, 0x1c, 0x0, 0x70bd29, 0x25dfdbff, "", [@nested={0x278, 0x3, [@generic="09b47b6d643908e3eee17f53ba47cfa99a4ae703fe4af77f5805d3e32946f3f6f47bf77a85e89f2a8173e2bcdcaf20633c83173ee94672d07118ac4b1d0a13e53e1dbd36eafdacdf2c10d3c4b9d09e0d354c1ee8d0b53339ad5076f7e61a618d39fa6334b8f1d1050d4b88ab75660855d15a7b2d79d2797c6c78581eb5f2b9574091d4b1eb5d354166f099e90c6a65825045bb06d61aaa1f11cda748c4d3c146cf4d15b2fa1f56e4dbffe922e3900e43f8358e19f97628c10ea2f3b6e7048a82e2b6404790400b6f2a5e96f63d76f2cc8d579a154c3aae59aad97e01e9d9b886f4398c313112aee1975a00fed0864ad6bed6", @typed={0x34, 0x4f, @binary="49bd3ac869dd661000ee10f7befabad3b596fca740c5e3ded0d15b616cbd3855ce332fab8e4f6c44566756edbb8ce706"}, @typed={0x8, 0x1b, @u32=0x4}, @typed={0xc, 0x80, @u64=0x5}, @generic="13bbd8b9ac8e668e0eabe5e3d13030fa85537a49e8ed97300db8c2112eaf7024572be292817194cd6bdae1561f40ebf5abaa2531ee1d23f6eb8896951a49c0feb8cc28c3b56cfa75ec5b0651db1a35cff282a217070dcbe24a0d693434334337f1aa5fa6b1e96e711c3b35e5752f86ca3c83d22089fd290ac0060d6fe9e2d685561ac71029ba70f200e4fb9f117699b278e5a9d8171ad71fe8af30f36d2e1b58b61495597b9dfd75e4a472c6e119ece592a5311fa6e92e52a111", @generic="d52a0f49227585553b510710616be74636f6cc89c9ca0683be8fc509d3862314e41aa0d054beb68d04cf6f4d28cfb96a1c998d0d1644f6ec11e68398fc8147c6ec04c4b0b7b25f005acef72f8ac9fcc0bcd825ac4acbcbc2610ad3f347b3c9d2b2b0", @typed={0xc, 0x3f, @u64=0x2}, @typed={0x8, 0x37, @u32=0x3}, @typed={0x8, 0x27, @fd=r2}]}, @generic, @generic="df0e02d22a315fea08e67debedf989c320b04c542bb4b20040a3e185aa3b1d0c0bede0ab4da22a0e0c3af2c1b8323fa38b28f1e4795684927f89dc623af43a48d41e50ba8f21dd5e1a3d06011082bfe24b2c285cd5def5035950053ad5631c8ad6db28c9b3b07004fa56a1e0030fc923b47418dc78474c183a7b7b04c8e1f74eadf7670c7b9998506cda11a5cdec0900bb9793db59a4114381dfcdee621c8aaa0d44abc69001a05fd7b150c51c975e93601bb4c24b21fddff9f87e4361350e6df27b"]}, 0x34c}, {&(0x7f0000000a80)={0x118, 0x3b, 0x620, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x5f, @uid=r3}, @generic="242b59259b0334aded05817aa0ff89349a7df0ed08c8f47b8c9d686138dc45ced917ade5734c040c099de485396c75116f5352aa0267009f8d5e7579b97d0c642c7bdeb663dc64d5794515da64df1a2799d39d60f3c0630c898b4b2f7c7de4aff5573cd1020562f95339f43e20ec5e388e844972", @generic="3087c5973bd0eca5e9708628aa40929b433e7241e6384e5988235e51891efbbe5ed6b2d8fe7c7e93f07d51aa5845d2b3d8d2b16bfa41544237ef0ee94619301f0388e1a83c75a61226b8cb3dabaf3d8fb20604e315ed32b84c5bcda952aa5783f247b61ae5d13f6205e2f8b1860075a549ca319a4d4ebc2ae8b7f850", @typed={0x8, 0x69, @fd=r4}, @typed={0x8, 0x80, @u32=0x73}]}, 0x118}, {&(0x7f0000000d00)={0x2b0, 0x1e, 0x200, 0x70bd28, 0x25dfdbfe, "", [@generic="b3911bb77ba2d6a7f8a085da258ac784cd0df7183cbf9d8788bda7ed43eb7b78b996da802eccc9a97cb6a0710e5cb57c8f6785cb2ce145355bc5261246a765a8f1202d021a132e858fd41a691033123a66def8e0db323e5ae9e41ec43522eb986acbcee364859945c467d0ddae9042fadcdb98d0f77f612d17271ddf012f", @typed={0x20, 0x5, @str='{ppp1posix_acl_access,]\x04\x00'}, @generic="056c34c85f968a49f8047b5a5432b37d22ac3c1787c59e9000313ddda68a3f5e923e0ab5a65b6cba66675549516384444c1971a0dfd52ee2bc0030a1aa0f8f7ccf3ec5ef7d73652c4245325c8b08b170c8c68a41afce01f1dd9a06cbc63390e019", @nested={0xc, 0x5e, [@typed={0x8, 0x12, @ipv4=@broadcast}]}, @nested={0x150, 0x2f, [@typed={0x8, 0x4a, @pid=r6}, @typed={0xd8, 0x21, @binary="7170322c0e77beed58d4355fe2dac7b8825fd22faf2a2c9e1466329d556cbe30ec9073a7c885accbb77243245bbae9a2374eb997094afc4f7884f368b602e68c0627745968f9c0be77c18a8d28335064327a207119f56ea7374e7d3b16879dab5bdfd48dc0c28d6545536312eff0430fdf101630760cc9b679bb8d90921ae9b4860856da2d3253ae3211132a8ec1df0a7144d804ee49a1cb93a0ca2e199eec759cda69f037f28ed92b5772d23cdd8a856c726e073484c0fcc2351c999299d01dbdb0348de87671daf1d2cda983f336cf77"}, @generic="386514814c0b01dc9c94603428941fc7115fc8c9ce2e995b724df5e6008cda82fcd0a0d2559e66bc2e74b4b98d415019ddc53e104741c9bfcd533553240530701ab6b4126ee8e3d5ecaa0b61f8f288c36b22a8e030301ead3f2b14b6d1716a99318f0a7a", @typed={0x8, 0x59, @ipv4=@empty}]}, @typed={0x8, 0x88, @u32=0x101}, @nested={0x3c, 0x6, [@typed={0x4, 0x64}, @typed={0x18, 0x6d, @str='cgroupvmnet0vmnet1\x00'}, @typed={0x14, 0x86, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0x8, 0x20, @uid=r7}]}]}, 0x2b0}], 0x5, &(0x7f0000001140)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}], 0x20}, 0x24000000) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmmsg(r11, &(0x7f0000000180), 0x400000000000117, 0x0) perf_event_open(&(0x7f0000001240)={0x0, 0x70, 0x9, 0x32adc234, 0x4, 0x1, 0x0, 0xfb2, 0x10004, 0x9, 0x3ff, 0x1, 0xffff, 0x7fffffff, 0x9c, 0x7, 0x6312, 0x4, 0x401, 0x3, 0x3, 0x100000001, 0x9, 0x2, 0x3, 0x7fffffff, 0x6, 0x3ff, 0x7fffffff, 0x1ff, 0x1, 0x3, 0x1ff, 0x7, 0x1, 0x5, 0xffffffffffffffff, 0x20, 0x0, 0x8, 0x5, @perf_config_ext={0x0, 0x6}, 0xa0, 0x3, 0x5, 0x0, 0xfffffffffffffffb, 0x1, 0x1f}, r8, 0x5, r0, 0x3) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000001400)={0x2, &(0x7f00000013c0)=[{0x0, 0x800, 0x85, 0xe9}, {0x8, 0x1, 0x101, 0x6}]}, 0x10) getxattr(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)=ANY=[@ANYBLOB="722e0000ec00"], &(0x7f0000001340)=""/75, 0x4b) pkey_alloc(0x0, 0x1) [ 269.877381] RDX: 0000000000412b61 RSI: fffffffffffffff7 RDI: 0000000000000000 [ 269.884642] RBP: 0000000000000000 R08: ffffffffffffffff R09: 00007ffdf8d9e8a0 [ 269.891895] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 269.899159] R13: 00007ffdf8d9e8a0 R14: 0000000000000000 R15: 00007ffdf8d9e8b0 03:23:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) 03:23:45 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x100) fstat(0xffffffffffffff9c, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x8, 0xa, 0x7fffffff, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000cc0)=0xe8) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001040)={0x0, 0x0}) stat(&(0x7f0000001540)='./file0\x00', &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r2, &(0x7f00000011c0)='security.capability\x00', &(0x7f0000001200)=@v2={0x2000000, [{0x0, 0xb4f}, {0x9, 0x6}]}, 0x14, 0x2) r10 = getgid() sendmsg$netlink(r0, &(0x7f0000001180)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x80004404}, 0xc, &(0x7f0000000fc0)=[{&(0x7f00000002c0)={0x2c0, 0x12, 0x400, 0x70bd2b, 0x4, "", [@generic='D', @generic="5c60bf35cfcf2f0d7e6e80a720f3f4c74712937a066f977de6fe05b73d6110bdae5d77221563e0ce2857a040a69d85f07c876a560d01c7f4", @nested={0x17c, 0x2, [@generic="d9d95c788b55374008509808df7bff3ca883fda193979113d6d1fab64396ea6fa0dfa5cda289da05e1749ff33d05ca4b023d2c8a3000b828962cf6c9d298a50532195d3cc0a53d088099602481308367cf1045c085903920070036acd5d51c852c30bba1a725291e027cf97b924e304574cb952fe39bcbc07f", @generic="9153e4962926154028740a757d5b6bbf8725e70738a0cd42db32d079dd808d5d3583237035ef43ffa7b9770835380ba1cdce9100ee7bc24fd09e365b1bd145f3e893e808bd2e4fcf9540e8210008a11a5b288cfc095d205564bffa7c5b131fb2e0f8011c24a7de338c21b3709d4fec4cd616b3ae77dff697aa65716d21a87c07e502c53869fbf5da77057888aa926e33262ca693c662c57cd0fff1660bc09494ea48cb472c3c00aa13a86641dec1fda5a08b6973b73756d290547735f39c23b09c98d607ea927ab8887615ef1f6dbc0ecd103a580dd1d6459bae9a4f8bfea9bec6e3a227cdb1cc57fe67e35fda7aa97c0e5180e83d95c2", @typed={0x8, 0x86, @fd=r1}]}, @typed={0xc, 0x2d, @u64=0x81}, @nested={0xbc, 0x3c, [@generic="cf603b0c6f46bb016b09df32c3d6324b069ffc706c312ebe1cc8f0ca6b3c9e1279", @generic="4dbc2e63626d225988ce57d67a79e8dbe5b4215c53690cf53c34e233977e16a0b780dfe7c14f360bf5ff1e969e85a40218d785525ec1bc2d4678a26670bbae99a928705074fae6245004eab18ec0794adf61e3efcff25cfb76c3d3e133fc771fe45bd308a628644e3adea922feb0cbe5c8529c6f5b1cc3a1cc54855fae73d1fb15bae318aa1af3a6d8cedf599995aca28b7a9d8f069319"]}, @generic="6a4a629bd2efa39f2407883ac61f4babca5260ee8f7bba30d431ed13f9c021c7e26264df0b9e388e3bc09c6b5f05076f54e1"]}, 0x2c0}, {&(0x7f0000000580)=ANY=[@ANYBLOB="480000002a0000012bbd7000fddbdf25558baea760995b136f7c68d74025655ef492d4f22bc81a72e82aaa516af8363f37d2cef5156f86164eff26f4b651b883aee397feef835d58"], 0x48}, {&(0x7f0000000640)={0x34c, 0x1c, 0x0, 0x70bd29, 0x25dfdbff, "", [@nested={0x278, 0x3, [@generic="09b47b6d643908e3eee17f53ba47cfa99a4ae703fe4af77f5805d3e32946f3f6f47bf77a85e89f2a8173e2bcdcaf20633c83173ee94672d07118ac4b1d0a13e53e1dbd36eafdacdf2c10d3c4b9d09e0d354c1ee8d0b53339ad5076f7e61a618d39fa6334b8f1d1050d4b88ab75660855d15a7b2d79d2797c6c78581eb5f2b9574091d4b1eb5d354166f099e90c6a65825045bb06d61aaa1f11cda748c4d3c146cf4d15b2fa1f56e4dbffe922e3900e43f8358e19f97628c10ea2f3b6e7048a82e2b6404790400b6f2a5e96f63d76f2cc8d579a154c3aae59aad97e01e9d9b886f4398c313112aee1975a00fed0864ad6bed6", @typed={0x34, 0x4f, @binary="49bd3ac869dd661000ee10f7befabad3b596fca740c5e3ded0d15b616cbd3855ce332fab8e4f6c44566756edbb8ce706"}, @typed={0x8, 0x1b, @u32=0x4}, @typed={0xc, 0x80, @u64=0x5}, @generic="13bbd8b9ac8e668e0eabe5e3d13030fa85537a49e8ed97300db8c2112eaf7024572be292817194cd6bdae1561f40ebf5abaa2531ee1d23f6eb8896951a49c0feb8cc28c3b56cfa75ec5b0651db1a35cff282a217070dcbe24a0d693434334337f1aa5fa6b1e96e711c3b35e5752f86ca3c83d22089fd290ac0060d6fe9e2d685561ac71029ba70f200e4fb9f117699b278e5a9d8171ad71fe8af30f36d2e1b58b61495597b9dfd75e4a472c6e119ece592a5311fa6e92e52a111", @generic="d52a0f49227585553b510710616be74636f6cc89c9ca0683be8fc509d3862314e41aa0d054beb68d04cf6f4d28cfb96a1c998d0d1644f6ec11e68398fc8147c6ec04c4b0b7b25f005acef72f8ac9fcc0bcd825ac4acbcbc2610ad3f347b3c9d2b2b0", @typed={0xc, 0x3f, @u64=0x2}, @typed={0x8, 0x37, @u32=0x3}, @typed={0x8, 0x27, @fd=r2}]}, @generic, @generic="df0e02d22a315fea08e67debedf989c320b04c542bb4b20040a3e185aa3b1d0c0bede0ab4da22a0e0c3af2c1b8323fa38b28f1e4795684927f89dc623af43a48d41e50ba8f21dd5e1a3d06011082bfe24b2c285cd5def5035950053ad5631c8ad6db28c9b3b07004fa56a1e0030fc923b47418dc78474c183a7b7b04c8e1f74eadf7670c7b9998506cda11a5cdec0900bb9793db59a4114381dfcdee621c8aaa0d44abc69001a05fd7b150c51c975e93601bb4c24b21fddff9f87e4361350e6df27b"]}, 0x34c}, {&(0x7f0000000a80)={0x118, 0x3b, 0x620, 0x70bd2c, 0x25dfdbfb, "", [@typed={0x8, 0x5f, @uid=r3}, @generic="242b59259b0334aded05817aa0ff89349a7df0ed08c8f47b8c9d686138dc45ced917ade5734c040c099de485396c75116f5352aa0267009f8d5e7579b97d0c642c7bdeb663dc64d5794515da64df1a2799d39d60f3c0630c898b4b2f7c7de4aff5573cd1020562f95339f43e20ec5e388e844972", @generic="3087c5973bd0eca5e9708628aa40929b433e7241e6384e5988235e51891efbbe5ed6b2d8fe7c7e93f07d51aa5845d2b3d8d2b16bfa41544237ef0ee94619301f0388e1a83c75a61226b8cb3dabaf3d8fb20604e315ed32b84c5bcda952aa5783f247b61ae5d13f6205e2f8b1860075a549ca319a4d4ebc2ae8b7f850", @typed={0x8, 0x69, @fd=r4}, @typed={0x8, 0x80, @u32=0x73}]}, 0x118}, {&(0x7f0000000d00)={0x2b0, 0x1e, 0x200, 0x70bd28, 0x25dfdbfe, "", [@generic="b3911bb77ba2d6a7f8a085da258ac784cd0df7183cbf9d8788bda7ed43eb7b78b996da802eccc9a97cb6a0710e5cb57c8f6785cb2ce145355bc5261246a765a8f1202d021a132e858fd41a691033123a66def8e0db323e5ae9e41ec43522eb986acbcee364859945c467d0ddae9042fadcdb98d0f77f612d17271ddf012f", @typed={0x20, 0x5, @str='{ppp1posix_acl_access,]\x04\x00'}, @generic="056c34c85f968a49f8047b5a5432b37d22ac3c1787c59e9000313ddda68a3f5e923e0ab5a65b6cba66675549516384444c1971a0dfd52ee2bc0030a1aa0f8f7ccf3ec5ef7d73652c4245325c8b08b170c8c68a41afce01f1dd9a06cbc63390e019", @nested={0xc, 0x5e, [@typed={0x8, 0x12, @ipv4=@broadcast}]}, @nested={0x150, 0x2f, [@typed={0x8, 0x4a, @pid=r6}, @typed={0xd8, 0x21, @binary="7170322c0e77beed58d4355fe2dac7b8825fd22faf2a2c9e1466329d556cbe30ec9073a7c885accbb77243245bbae9a2374eb997094afc4f7884f368b602e68c0627745968f9c0be77c18a8d28335064327a207119f56ea7374e7d3b16879dab5bdfd48dc0c28d6545536312eff0430fdf101630760cc9b679bb8d90921ae9b4860856da2d3253ae3211132a8ec1df0a7144d804ee49a1cb93a0ca2e199eec759cda69f037f28ed92b5772d23cdd8a856c726e073484c0fcc2351c999299d01dbdb0348de87671daf1d2cda983f336cf77"}, @generic="386514814c0b01dc9c94603428941fc7115fc8c9ce2e995b724df5e6008cda82fcd0a0d2559e66bc2e74b4b98d415019ddc53e104741c9bfcd533553240530701ab6b4126ee8e3d5ecaa0b61f8f288c36b22a8e030301ead3f2b14b6d1716a99318f0a7a", @typed={0x8, 0x59, @ipv4=@empty}]}, @typed={0x8, 0x88, @u32=0x101}, @nested={0x3c, 0x6, [@typed={0x4, 0x64}, @typed={0x18, 0x6d, @str='cgroupvmnet0vmnet1\x00'}, @typed={0x14, 0x86, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @typed={0x8, 0x20, @uid=r7}]}]}, 0x2b0}], 0x5, &(0x7f0000001140)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}], 0x20}, 0x24000000) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmmsg(r11, &(0x7f0000000180), 0x400000000000117, 0x0) perf_event_open(&(0x7f0000001240)={0x0, 0x70, 0x9, 0x32adc234, 0x4, 0x1, 0x0, 0xfb2, 0x10004, 0x9, 0x3ff, 0x1, 0xffff, 0x7fffffff, 0x9c, 0x7, 0x6312, 0x4, 0x401, 0x3, 0x3, 0x100000001, 0x9, 0x2, 0x3, 0x7fffffff, 0x6, 0x3ff, 0x7fffffff, 0x1ff, 0x1, 0x3, 0x1ff, 0x7, 0x1, 0x5, 0xffffffffffffffff, 0x20, 0x0, 0x8, 0x5, @perf_config_ext={0x0, 0x6}, 0xa0, 0x3, 0x5, 0x0, 0xfffffffffffffffb, 0x1, 0x1f}, r8, 0x5, r0, 0x3) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000001400)={0x2, &(0x7f00000013c0)=[{0x0, 0x800, 0x85, 0xe9}, {0x8, 0x1, 0x101, 0x6}]}, 0x10) getxattr(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)=ANY=[@ANYBLOB="722e0000ec00"], &(0x7f0000001340)=""/75, 0x4b) pkey_alloc(0x0, 0x1) 03:23:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) 03:23:45 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) [ 269.968624] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 269.984485] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) 03:23:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) [ 270.079945] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 270.112284] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 270.157256] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 270.181017] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:45 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket(0x18, 0x5, 0xffffffffffffffff) getsockopt$ax25_int(r0, 0x101, 0xf, &(0x7f0000000040), &(0x7f0000000100)=0x4) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000340)={[{@workdir={'workdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file1'}}]}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0xff) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 03:23:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) 03:23:45 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) [ 270.210884] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 270.223388] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 270.242112] kobject: 'loop0' (000000000b125da2): kobject_uevent_env 03:23:45 executing program 3: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000010b) 03:23:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) 03:23:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) 03:23:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) [ 270.264789] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 270.302351] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. 03:23:45 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) [ 270.334179] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 270.340860] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:23:45 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000010b) 03:23:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000040)=0x8f) 03:23:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) 03:23:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) [ 270.407095] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 270.430887] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) 03:23:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) [ 270.468569] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 270.480665] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:45 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) [ 270.521511] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 270.559954] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 270.601427] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 270.613483] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 270.627688] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 270.635921] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 270.647896] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 270.655725] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:45 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) 03:23:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) 03:23:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) 03:23:45 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000010b) 03:23:45 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, 0x0, 0x46b) [ 270.718757] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 270.726592] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:23:45 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) 03:23:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) 03:23:45 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) [ 270.796490] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 270.805576] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 270.831885] kobject: 'loop0' (000000000b125da2): kobject_uevent_env 03:23:45 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000010b) 03:23:45 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:45 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:45 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) [ 270.850694] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 270.879370] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 270.892718] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) 03:23:46 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) [ 270.936226] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 270.955636] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 270.978100] kobject: 'loop4' (000000002394e043): kobject_uevent_env 03:23:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:46 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) [ 270.998253] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 271.031542] kobject: 'loop0' (000000000b125da2): kobject_uevent_env 03:23:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:46 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) 03:23:46 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) 03:23:46 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 03:23:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 271.053271] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 271.096349] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 271.111887] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 03:23:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:46 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) 03:23:46 executing program 0: openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) [ 271.143994] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 271.164869] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:46 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:46 executing program 4: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) 03:23:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 271.198290] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 271.211221] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:46 executing program 0: openat$vfio(0xffffffffffffff9c, 0x0, 0x105900, 0x0) 03:23:46 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) 03:23:46 executing program 4: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) [ 271.261679] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 271.276270] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 271.309335] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 271.331489] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 271.355210] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 271.369529] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 271.384258] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 271.390776] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 271.401162] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 271.407670] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 271.418272] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 271.424779] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 271.434698] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 271.441138] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:23:46 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 03:23:46 executing program 0: openat$vfio(0xffffffffffffff9c, 0x0, 0x105900, 0x0) 03:23:46 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:46 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:46 executing program 1: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:46 executing program 4: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) 03:23:47 executing program 1: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 271.926933] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 271.933457] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:47 executing program 4: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 03:23:47 executing program 0: openat$vfio(0xffffffffffffff9c, 0x0, 0x105900, 0x0) 03:23:47 executing program 1: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:47 executing program 4: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 03:23:47 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0xa93) [ 272.004238] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 272.018794] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 272.077423] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 272.100761] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 272.117830] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 272.126075] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 272.137164] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 272.143899] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 272.154796] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 272.161285] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:47 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 03:23:47 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:47 executing program 0: openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x0, 0x0) 03:23:47 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:47 executing program 4: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 03:23:47 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) [ 272.780851] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 272.790796] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:47 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:47 executing program 0: openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x0, 0x0) 03:23:47 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) [ 272.827504] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 272.842202] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:47 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 03:23:47 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 272.882035] kobject: 'loop0' (000000000b125da2): kobject_uevent_env 03:23:47 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0xa93) [ 272.925929] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 272.943358] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 272.950518] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 272.994030] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 273.000735] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:48 executing program 2: open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:48 executing program 0: openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x0, 0x0) 03:23:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:48 executing program 4: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 03:23:48 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:48 executing program 4: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) 03:23:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 273.620706] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 273.637476] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:48 executing program 2: open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:48 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) [ 273.678048] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 273.704031] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:48 executing program 4: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) [ 273.732987] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 273.755461] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:48 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 273.785011] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 273.798371] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:48 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:48 executing program 2: open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:48 executing program 4: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) 03:23:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:48 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 273.851261] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 273.878049] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:49 executing program 2: mknod(0x0, 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 273.910542] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 273.924658] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 273.942446] kobject: 'loop0' (000000000b125da2): kobject_uevent_env 03:23:49 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) [ 273.954893] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:49 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:49 executing program 0: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 273.981628] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 274.013992] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 274.065530] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 274.073230] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 274.108950] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 274.116269] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 274.127356] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 274.134392] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:49 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xa93) 03:23:49 executing program 2: mknod(0x0, 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:49 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:49 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:49 executing program 0: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:49 executing program 2: mknod(0x0, 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 274.674973] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 274.681472] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:23:49 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:49 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:49 executing program 0: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 274.727459] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 274.739071] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:49 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x46b) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:49 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 274.770137] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 274.788674] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 274.823257] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 274.833314] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 274.847953] audit: type=1804 audit(1556594629.895:63): pid=8896 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir225085385/syzkaller.f4Pdiu/41/file0" dev="sda1" ino=16553 res=1 [ 274.871694] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 274.880875] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 274.917985] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 274.924647] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:50 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:50 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:50 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:50 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xa93) 03:23:50 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, 0x0, 0x46b) 03:23:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:50 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 275.529455] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 275.537917] audit: type=1804 audit(1556594630.585:64): pid=8906 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir225085385/syzkaller.f4Pdiu/42/file0" dev="sda1" ino=16638 res=1 [ 275.544675] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:23:50 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:50 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:50 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 275.610789] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 275.650447] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:50 executing program 0: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 275.681957] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 275.694225] audit: type=1804 audit(1556594630.745:65): pid=8926 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir225085385/syzkaller.f4Pdiu/43/file0" dev="sda1" ino=16653 res=1 [ 275.698023] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:50 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 03:23:50 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:50 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 275.753646] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 275.760576] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 275.781430] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 275.790924] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 275.818865] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 275.833696] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 275.849242] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 275.860711] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:51 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xa93) 03:23:51 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:51 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:51 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:51 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:51 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) [ 276.419598] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 276.427347] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:23:51 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', 0x0) 03:23:51 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:51 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', 0x0) [ 276.462604] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 276.481906] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 276.539773] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 276.548791] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:51 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 03:23:51 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:51 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 276.612033] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 276.621297] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 276.638118] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 276.645594] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 276.674784] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 276.681326] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:52 executing program 3: r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:52 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:52 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', 0x0) 03:23:52 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:52 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xa93) 03:23:52 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:52 executing program 3: r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) [ 277.280686] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 277.289092] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:23:52 executing program 5: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:52 executing program 0: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 277.331811] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 277.367511] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:52 executing program 3: r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) [ 277.417069] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 277.432146] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 277.448459] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 277.459016] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:52 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:52 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 03:23:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:52 executing program 5: syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:52 executing program 3: mknod(0x0, 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) [ 277.488235] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 277.504558] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:52 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f00000002c0)=@builtin='builtin_trusted\x00') [ 277.545938] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 277.562815] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 277.580394] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 277.590544] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 277.626297] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 277.632850] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:53 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) 03:23:53 executing program 5: syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:53 executing program 3: mknod(0x0, 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f00000002c0)=@builtin='builtin_trusted\x00') 03:23:53 executing program 5: syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:53 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) [ 278.221336] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 278.230241] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 278.247089] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 278.253934] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:23:53 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(0x0, 0x0) 03:23:53 executing program 3: mknod(0x0, 0x1120, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', 0x0) 03:23:53 executing program 5: syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:53 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x105900, 0x0) 03:23:53 executing program 4: open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 278.326296] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 278.332779] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:53 executing program 4: open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:53 executing program 5: syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:53 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', 0x0) [ 278.378696] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 278.403845] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:23:53 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:53 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x108) 03:23:53 executing program 4: open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 278.437685] kobject: 'loop0' (000000000b125da2): kobject_uevent_env [ 278.465744] kobject: 'loop0' (000000000b125da2): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 278.518879] kobject: 'loop3' (0000000006c71984): kobject_uevent_env [ 278.522688] audit: type=1804 audit(1556594633.565:66): pid=9053 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir999239910/syzkaller.aeE8uy/43/file0" dev="sda1" ino=16577 res=1 [ 278.535627] kobject: 'loop3' (0000000006c71984): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 278.582502] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 278.589432] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 278.600919] kobject: 'loop4' (000000002394e043): kobject_uevent_env [ 278.607531] kobject: 'loop4' (000000002394e043): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:23:54 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(0x0, 0x0) 03:23:54 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', 0x0) 03:23:54 executing program 5: syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) 03:23:54 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x2, 0x56, 0x7}) 03:23:54 executing program 4: mknod(0x0, 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:54 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) 03:23:54 executing program 5: syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700), 0x100000000000010b) [ 279.247442] kobject: 'loop2' (000000007cc0ef62): kobject_uevent_env [ 279.254028] audit: type=1804 audit(1556594634.295:67): pid=9069 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir999239910/syzkaller.aeE8uy/44/file0" dev="sda1" ino=16685 res=1 03:23:54 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000180)='asymmetric\x00', &(0x7f00000002c0)=@builtin='builtin_trusted\x00') syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) 03:23:54 executing program 5: syz_open_dev$dmmidi(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) writev(0xffffffffffffffff, 0x0, 0x0) 03:23:54 executing program 4: mknod(0x0, 0x1120, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:23:54 executing program 0: clone(0x403502001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000080)="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") openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:23:54 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setpipe(r0, 0x407, 0xa93) [ 279.304354] kobject: 'loop2' (000000007cc0ef62): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 279.330336] kobject: 'loop4' (000000002394e043): kobject_uevent_env