sing attributes in process `syz-executor.5'. [ 1410.919304] audit: type=1804 audit(1577124367.467:4077): pid=1608 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/398/file0/file0" dev="loop2" ino=1723 res=1 18:06:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) dup(0xffffffffffffffff) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) io_submit(0x0, 0x1, &(0x7f0000000300)=[0x0]) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = creat(&(0x7f00000002c0)='./bus\x00', 0x80) fcntl$setstatus(r3, 0x4, 0x6100) r4 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r5 = socket(0xa, 0x0, 0x8) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r5, 0x0, 0x20004850) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0xffffffffffffffb7) r6 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x2}}, 0x34) sendmsg$nl_route(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[]}}, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000340)=0x8) ftruncate(r3, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f00000008c0)=""/218, 0xda}, {0x0}], 0x2}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003680)=""/187, 0xbb}, 0xfffffffd}], 0x2, 0x0, &(0x7f0000005480)) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x175d900f) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) setreuid(0xee01, r9) getresuid(&(0x7f0000004180), 0x0, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000475000/0x3000)=nil) [ 1410.987772] Unknown ioctl 19258 [ 1411.006387] QAT: Invalid ioctl 18:06:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x3000000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:07 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1411.061217] Unknown ioctl 19258 [ 1411.077751] QAT: Invalid ioctl 18:06:08 executing program 0: r0 = socket$kcm(0x10, 0xa, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="140000002a008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) r1 = semget$private(0x0, 0x0, 0x11) semctl$IPC_INFO(r1, 0x1, 0x3, &(0x7f0000000340)=""/93) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000140)=""/177) 18:06:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x4000000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:08 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:08 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='\b\x00\x00\x00\x01\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000780)={@dev, 0x0}, &(0x7f0000000800)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x1f}, @loopback, 0x0, 0x0, 0x1, 0x0, 0x401, 0x3de335b92c07357c, r1}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg(r4, &(0x7f0000000300)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000440)=""/132, 0x84}, {&(0x7f0000000500)=""/240, 0xf0}, {&(0x7f00000000c0)=""/25, 0x19}], 0x4, &(0x7f0000000240)}, 0x161) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = socket(0x2000000011, 0x4000000000080002, 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r6, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @remote}}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x40}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffffffc0}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044010}, 0x100e1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0189436, &(0x7f0000000040)) r8 = getpid() r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r9, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r8, r9, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r8, r7, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$DRM_IOCTL_SET_VERSION(r7, 0xc0106407, &(0x7f0000000680)={0x40, 0xdd8, 0x80000000, 0x3ff}) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f0000000600)={&(0x7f0000000380)={0x40, r6, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7a}]}, 0x40}}, 0xdbcfc495b5411da7) setresgid(0x0, 0x0, 0x0) creat(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) [ 1411.558068] audit: type=1804 audit(1577124368.107:4078): pid=1659 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/399/file0/file0" dev="loop2" ino=1724 res=1 18:06:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ca81925a0805115, @perf_config_ext={0x4}, 0x20828}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x1, {0xa, 0x4e24, 0x2f4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x645}, r3}}, 0x38) r4 = socket(0xa, 0x0, 0x8) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r4, 0x0, 0x20004850) r5 = socket(0xa, 0x0, 0x8) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r5, 0x0, 0x20004850) r6 = socket(0xa, 0x0, 0x8) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r6, 0x0, 0x20004850) r7 = accept4$ax25(r6, &(0x7f0000000580)={{0x3, @default}, [@netrom, @null, @rose, @null, @netrom, @bcast, @bcast]}, &(0x7f00000003c0)=0x48, 0x80800) getsockname$ax25(r7, &(0x7f0000000780)={{0x3, @netrom}, [@remote, @remote, @remote, @rose, @remote, @null, @default, @netrom]}, &(0x7f00000006c0)=0x360) 18:06:08 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0x10, 0x2, [@gre_common_policy=[@IFLA_GRE_IKEY={0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x40}}, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) sendfile(r1, r2, 0x0, 0x0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000040)) [ 1411.905905] device nr0 entered promiscuous mode 18:06:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xa000000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1411.992514] net_ratelimit: 14 callbacks suppressed [ 1411.992522] protocol 88fb is buggy, dev hsr_slave_0 [ 1412.002715] protocol 88fb is buggy, dev hsr_slave_1 [ 1412.248517] device nr0 entered promiscuous mode 18:06:08 executing program 2: socket$tipc(0x1e, 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x0) recvmsg(r0, &(0x7f0000000900)={&(0x7f00000000c0)=@ipx, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)=""/215, 0xd7}, {&(0x7f00000006c0)=""/220, 0xdc}, {&(0x7f0000000180)}, {&(0x7f00000007c0)=""/204, 0xcc}, {&(0x7f0000000240)=""/65, 0x41}, {&(0x7f00000004c0)=""/124, 0x7c}, {&(0x7f00000001c0)=""/41, 0x29}], 0x7, &(0x7f00000008c0)=""/29, 0x1d}, 0x102) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x17a, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x7d95, 0xfff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f0000000940)={'syz', 0x3}, &(0x7f0000000980)="1f531731f9c4455cce670d3620b0439b71ab4df514be3a6fc3f83cb0eced10e2f48f21c2018948a3c958a2c15943420f1aa0936041c66f649d6787bbd4c7d9fda7fe0ba1765ba9f940bca017cd2969699ba39ec5df17bc4ae14ee971e7e647453c199010029a7fe7de9f84a6c347dba54d346d8b0d4110f51e76fe8893511ff35ded1542f34a116698cc5e1da74f4559", 0x90, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r3) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r4, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:09 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x2) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000880)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000040)) chdir(&(0x7f0000000140)='./bus\x00') mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000080)) 18:06:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xe000000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='\b\x00\x00\x00\x01\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000780)={@dev, 0x0}, &(0x7f0000000800)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x1f}, @loopback, 0x0, 0x0, 0x1, 0x0, 0x401, 0x3de335b92c07357c, r1}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg(r4, &(0x7f0000000300)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000440)=""/132, 0x84}, {&(0x7f0000000500)=""/240, 0xf0}, {&(0x7f00000000c0)=""/25, 0x19}], 0x4, &(0x7f0000000240)}, 0x161) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = socket(0x2000000011, 0x4000000000080002, 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r6, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @remote}}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x40}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffffffc0}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044010}, 0x100e1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0189436, &(0x7f0000000040)) r8 = getpid() r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r9, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r8, r9, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r8, r7, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$DRM_IOCTL_SET_VERSION(r7, 0xc0106407, &(0x7f0000000680)={0x40, 0xdd8, 0x80000000, 0x3ff}) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f0000000600)={&(0x7f0000000380)={0x40, r6, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7a}]}, 0x40}}, 0xdbcfc495b5411da7) setresgid(0x0, 0x0, 0x0) creat(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) 18:06:09 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:09 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1412.597864] audit: type=1804 audit(1577124369.147:4079): pid=1748 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/401/file0/file0" dev="loop2" ino=1725 res=1 18:06:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x40, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1412.790399] device nr0 entered promiscuous mode [ 1412.809890] device nr0 entered promiscuous mode 18:06:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x10000000000004}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10b80}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c) sendmmsg(r1, &(0x7f0000005fc0), 0xa9, 0x0) 18:06:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xf000000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='\b\x00\x00\x00\x01\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000780)={@dev, 0x0}, &(0x7f0000000800)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x1f}, @loopback, 0x0, 0x0, 0x1, 0x0, 0x401, 0x3de335b92c07357c, r1}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg(r4, &(0x7f0000000300)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000440)=""/132, 0x84}, {&(0x7f0000000500)=""/240, 0xf0}, {&(0x7f00000000c0)=""/25, 0x19}], 0x4, &(0x7f0000000240)}, 0x161) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = socket(0x2000000011, 0x4000000000080002, 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r6, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @remote}}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x40}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffffffc0}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044010}, 0x100e1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0189436, &(0x7f0000000040)) r8 = getpid() r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r9, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r8, r9, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r8, r7, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$DRM_IOCTL_SET_VERSION(r7, 0xc0106407, &(0x7f0000000680)={0x40, 0xdd8, 0x80000000, 0x3ff}) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f0000000600)={&(0x7f0000000380)={0x40, r6, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7a}]}, 0x40}}, 0xdbcfc495b5411da7) setresgid(0x0, 0x0, 0x0) creat(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) [ 1412.946616] audit: type=1804 audit(1577124369.497:4080): pid=1781 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/402/file0/file0" dev="loop2" ino=1726 res=1 18:06:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x3f000000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:09 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000000c0)=0x7, &(0x7f0000000100)=0x4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$can_raw(0x1d, 0x3, 0x1) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$bt_rfcomm(r4, &(0x7f0000000480)={0x1f, {0x6, 0x7f, 0x0, 0x7}, 0x7}, 0xa) setsockopt(0xffffffffffffffff, 0x65, 0x0, 0x0, 0x0) 18:06:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x40000000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:09 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='\b\x00\x00\x00\x01\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f0000000340)={@local}) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000780)={@dev, 0x0}, &(0x7f0000000800)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x1f}, @loopback, 0x0, 0x0, 0x1, 0x0, 0x401, 0x3de335b92c07357c, r1}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r3, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg(r4, &(0x7f0000000300)={&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/44, 0x2c}, {&(0x7f0000000440)=""/132, 0x84}, {&(0x7f0000000500)=""/240, 0xf0}, {&(0x7f00000000c0)=""/25, 0x19}], 0x4, &(0x7f0000000240)}, 0x161) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = socket(0x2000000011, 0x4000000000080002, 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r6, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @remote}}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x40}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffffffc0}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044010}, 0x100e1) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0xc0189436, &(0x7f0000000040)) r8 = getpid() r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r9, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r8, r9, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r8, r7, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$DRM_IOCTL_SET_VERSION(r7, 0xc0106407, &(0x7f0000000680)={0x40, 0xdd8, 0x80000000, 0x3ff}) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f0000000600)={&(0x7f0000000380)={0x40, r6, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7a}]}, 0x40}}, 0xdbcfc495b5411da7) setresgid(0x0, 0x0, 0x0) creat(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) [ 1413.432493] protocol 88fb is buggy, dev hsr_slave_0 [ 1413.437647] protocol 88fb is buggy, dev hsr_slave_1 [ 1413.442837] protocol 88fb is buggy, dev hsr_slave_0 [ 1413.447928] protocol 88fb is buggy, dev hsr_slave_1 18:06:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x60000000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1413.619632] audit: type=1400 audit(1577124370.137:4081): avc: denied { mac_admin } for pid=1806 comm="syz-executor.2" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 1413.651821] SELinux: Context unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 is not valid (left unmapped). [ 1413.698843] audit: type=1804 audit(1577124370.247:4082): pid=1807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/403/file0/file0" dev="sda1" ino=17057 res=1 [ 1413.727362] audit: type=1804 audit(1577124370.257:4083): pid=1824 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/403/file0/file0" dev="sda1" ino=17057 res=1 [ 1413.758724] audit: type=1804 audit(1577124370.257:4084): pid=1824 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/403/file0/file0" dev="sda1" ino=17057 res=1 [ 1414.053031] audit: type=1804 audit(1577124370.597:4085): pid=1807 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/403/file0/file0" dev="sda1" ino=17057 res=1 [ 1414.172968] audit: type=1804 audit(1577124370.637:4086): pid=1833 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/403/file0/file0" dev="sda1" ino=17057 res=1 [ 1414.205368] audit: type=1804 audit(1577124370.647:4087): pid=1832 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/403/file0/file0" dev="sda1" ino=17057 res=1 [ 1414.240741] audit: type=1804 audit(1577124370.667:4088): pid=1833 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/403/file0/file0" dev="sda1" ino=17057 res=1 18:06:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0xa, 0x0, 0x8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r1, 0x0, 0x20004850) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0xbc, "74f1922154e585a81896a57f79cb402af0fa353b742422cc06b84c26ce2a86fac5c9745b3fe1c2484aa1e8d2c30e226e3472c7a31f78110d705cea6bd94958d5463e83a5100730b245820469e2cfa0eccc98142c70541b997a50f7bc1fd71caf152f382e1142e4d36468e1d39a41c45882a5f47707fda18b7274cdb1974d2342a74d56413056c6a241706be24bba88b943fb392801d8f0e9d411485dd8691274b06a1c84c260707cb67d58f87a824b3b78b2eb893f75b36d2665a394"}, &(0x7f0000000180)=0xe0) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@mcast2, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000280)=0x7, 0x4) [ 1414.268674] audit: type=1804 audit(1577124370.687:4089): pid=1832 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/403/file0/file0" dev="sda1" ino=17057 res=1 18:06:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x595aaf5671cc466c, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000040)) 18:06:10 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x9effffff, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:10 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000000c0)=0x7, &(0x7f0000000100)=0x4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$can_raw(0x1d, 0x3, 0x1) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$bt_rfcomm(r4, &(0x7f0000000480)={0x1f, {0x6, 0x7f, 0x0, 0x7}, 0x7}, 0xa) setsockopt(0xffffffffffffffff, 0x65, 0x0, 0x0, 0x0) 18:06:10 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1414.494905] device nr0 entered promiscuous mode 18:06:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xf0ffffff, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:11 executing program 0: r0 = socket(0xa, 0x0, 0x8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r0, 0x0, 0x20004850) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x18}, 'ifb0\x00'}}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2, 0x800, 0x3) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400160010000100f6fffe0f0000ffff0000000008001b0000000000"], 0x3c}}, 0x0) [ 1414.583580] device nr0 entered promiscuous mode 18:06:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xf1130000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1414.698838] audit: type=1804 audit(1577124371.247:4090): pid=1862 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/404/file0/file0" dev="sda1" ino=16529 res=1 [ 1414.864667] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:06:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x2404, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x4d02, 0x0, 0x0, 0x565d04c63fb6612c, 0x0, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1414.904524] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1414.953032] protocol 88fb is buggy, dev hsr_slave_0 [ 1414.958878] protocol 88fb is buggy, dev hsr_slave_1 [ 1414.964839] protocol 88fb is buggy, dev hsr_slave_0 [ 1415.065799] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:06:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xfffff000, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:11 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000000c0)=0x7, &(0x7f0000000100)=0x4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$can_raw(0x1d, 0x3, 0x1) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$bt_rfcomm(r4, &(0x7f0000000480)={0x1f, {0x6, 0x7f, 0x0, 0x7}, 0x7}, 0xa) setsockopt(0xffffffffffffffff, 0x65, 0x0, 0x0, 0x0) [ 1415.170160] FAT-fs (loop2): bogus number of reserved sectors [ 1415.270231] FAT-fs (loop2): Can't find a valid FAT filesystem 18:06:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0), 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0) 18:06:12 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0)=0x4, 0x4) r1 = dup2(r0, r0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x6c8f8ac777ec6d17, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="aab00000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) r6 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r6, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) r7 = syz_open_procfs(r6, &(0x7f0000000080)='autogroup\x00') setsockopt$inet6_int(r7, 0x29, 0x4a, &(0x7f0000000180)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) 18:06:12 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r4, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xffffff7f, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:12 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1415.872881] FAT-fs (loop2): bogus number of reserved sectors [ 1415.883957] FAT-fs (loop2): Can't find a valid FAT filesystem 18:06:12 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mounts\x00') getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000000c0)=0x7, &(0x7f0000000100)=0x4) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x1}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2af, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$can_raw(0x1d, 0x3, 0x1) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$bt_rfcomm(r4, &(0x7f0000000480)={0x1f, {0x6, 0x7f, 0x0, 0x7}, 0x7}, 0xa) setsockopt(0xffffffffffffffff, 0x65, 0x0, 0x0, 0x0) 18:06:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x81, 0x0, 0x7, 0x100000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000300)="17018513f5ecd24dac099b7641ceb3a8ac772a627b3a368e7f87ee77ffe07d918023d25a03f5205d3c94d0fcd6244c6b8a7672821ebe53d47b47f6ca3714991c446424f3a7b0e4a062df7173870a2c5d3d3223863b50afc7c70bd9dd0a0224ca01aefda3d49353e12a4013ce9e6a9ae0d8fddbc5d38472f07f23ea87eed5fc6afb9e5ba75e5ea0b601b9a54bc3a8108cf02e0be2860f755e1886e378dd81a490f63c896eceb72e937ceba61e1d1eb50494e374bdd2d19063d3ab6782930d0f31de35953006201093164c02f3"}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1416.084823] device nr0 entered promiscuous mode 18:06:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xffffff9e, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1416.130852] device nr0 entered promiscuous mode 18:06:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xfffffff0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0xffffffff, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f00000004c0)=""/251, 0xfb}}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xffffffffffffffb5}], 0xaaaac44, 0x0, 0x0, 0xfffffe41) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e, 0x40]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r3, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:06:13 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaf5b96a6711d4679079d00"/131], 0x15) r2 = dup(r1) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000080)) lstat(&(0x7f00000004c0)='./file0\x00', 0x0) umount2(0x0, 0x0) 18:06:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="65e25c1a0761c29c796cfacd0bf3674eacaba85b92cd085fa80a6a8aac9dc489f7c49c274bdf31e50ccc0f9a1af51eeac808b7a3f6f8", 0x36, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:13 executing program 5: ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x8200) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x48babc9a345861d4, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) getegid() getuid() mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="2c3ceb8648e19543ecde7df25a75d32b354aaac5360b8dcb894860e9fa24a8940000e50000", @ANYRESDEC]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xbf) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_init_net_socket$ax25(0x3, 0x1, 0x4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r5, @ANYBLOB="00000000000000001800120008000100736974000c0002000800020044968604db22d871d814146329a7b6a35b82ea96d7d62d5066729640f95aa071a6a4d3eaebaf64226edf1c82d32f810f7a7abf7f7e9f390a6325d25e4afa87ed9d0dfb69dedbd03e1dee2860be3c8edb9d372fe0e346ca4a615d94e39dce8d42c538561743005e1931668bb902dbb957a3d7ff4b7cfe6471800521256153a323a5e0223df201b217b4716bfa82d91e74314d1365129a595fd2ff4f302d61a648d209cf8b300529", @ANYRES32], 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x43b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2a8}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8}]]}}}]}, 0x38}}, 0x0) 18:06:14 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r4, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0xf, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:14 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={0x0, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:14 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000840)=ANY=[@ANYBLOB="02090000020000000061bf74643ebf80395a6bf20aa73dc38e1875673422335d125f739d7de461f3d52ee905e9f4d0c4a9482ac0c6c608858cb5d0fff720cd52833214ad64421b590b719093ec676200b7f81b559bd6773650416a24746108a7640ef8863b8735fd55248afa7ad9aea09e4d666fd0b87338282c809c2f3182ae2801064eafb87f565e420ef84c2b2e8bc328a778345f00c78e4292f9732d1f0af7f87fe42a1094b5ea0783a0d44a18a8d8186d808f10e8db2458d6d3a66497c6d4525626257cfb5daea35cc56c781dd8871f0a5ea808d58c52ebfc178ea22cdc6b338c0787a0d1de38c8a774732843eb517d9b4f3b58823c6266bffec1ac192a88a78a1a42f50573411a98fee12e5f944cc5ef4790605c7933b2b9c4a2bbfeee22a62b1326224d07a31b3a375e1e85e0f270d265849d37c18ad32436087b4bd429b2050aa869afbdf2e18f34e0d0baa1b9bd6129d2104a378b831b5970f8616403c527c761478650ff6088c136b98b5d44ef619745984cc76a34409b90cca6fa1ca888da1e12805894c163ad3aa25edb59a4f5d7d533fa31489b3c270f9544958c81adcfa70e57a30000000000"], 0x10}}, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r2) fstat(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x100, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000400)={[{@hostdata={'hostdata'}}], [{@fowner_gt={'fowner>', r3}}]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="020700000200000000000000000000001f9e61bd01c4609f5c2d4392553faa8f3040127683332f5eddb2025f3e70885d6a259406bc58865711b26acd041e4dccd4477c9d52c9b479ca95e4f655d6cbdbdd030000000000e2c5f951000009cb9c9ef21340440cac1eadb93def086f7bc8641de0993e1e81763a490220d191c7c81c56bc0100008000000000be0058cb01e5e98fcd68e9ade41ffecabea82f21eb3f8de759967b2bbd1565162c6c9d02196c003aaabc61b3960000000000000100641b038030507a48bdfa0b80b55b4851da5df198e82294c14fe0127a118c956837c585785cdebac18a0dca00"/247], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x2, 0xb, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000400)={0x0, 0xffffffffffffff94, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r7}], @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}]}}}]}, 0x40}}, 0x0) sendmmsg(r4, &(0x7f0000003440)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)="89f6d63b1e71e925d41ed1fff3beabdba40a924250d72c7a67cd23407dcfa0c7a9918d0e113c07178872a866739fc868b75741160cd5cabea1ede7c27a70c2f08b46d8917d987514802cef6645043038e4dd5ff744", 0x55}], 0x1, &(0x7f0000000a00)=[{0x108, 0x111, 0x5, "fe2523dc84f419b17e53512d76f3152240e261f92466f7e748792f332abed7048908ad8030cd7772ae9830f0e03f6f2bd41cad5d3058d468166fe68c06cddfa5cc13ab22b3a8cf1c85c272fca7632e84d66e83e0f94bf62f4adeba3a1ce06364a038f7dff4fcee0a0cac4f51f1bd0d5d1bef426e8c0489962b8de29ae724b16ad84b1a1616d17f1f03a7f0dc2bcd8b33d02ea2a8bced9d3475415d207a895eccab87ab7ed1872b20db76c189185814b24348a7d692bd9983a9c8c8e3441a77d29cd3b67d8122e21a9138293a973b44bbc9c870587980cc0b0598e097315d02c02e35249da86cb8c1571a8a9e6d9a301e745d90"}, {0xb0, 0x101, 0x8a6, "fade11cc1e5d4ac9d61c1286b472b63f2c8d95af56bab7b563f0fc4f2987a7b6dd78c813e4421d19ba0498a4ccc911d8ff7732fd02c956d5de082f82fed21f6f308ac9144a7e3d16ee8cb44cbd9032e118f2800fefe2c27a266ab8ec24b0d514ba6df444b30295b7220725205a8995dee6fb8b3db841051dc7f5ed0eb66831e843388485aa67fc58c69edf06e61c5e945e99b0846954326747c2d5"}, {0xb0, 0x10c, 0x7, "fb01fb2556cc56e8c5534a9bd62670dad54b9512f00e7080573f761f6588c31de3c8e51dd7a4f505f13ee73626273f72d58c9ad38ee2fd7b494c6233e78e70b6b12a531f4b35e4a9809de6617b798047208bdd62e09785f3f790075a93cf79e69aaf363c8d9df395360414de4ab53d46862a6d0a54ebb24d5e03434e3ec99cc6df2c5f1cd68fc5b8e0dfe8ccea4e93d1853005dc34745a945810ea"}, {0x70, 0x0, 0x80000001, "bbe3b07f6774f2cf93d7191697af681c0a7a8430073bcf0504089441cd77982edf3ad315f61c6718aaabeade31513b4fde318d1ee6947bbb0b30b4b4b6f8e5ce4d25940504f095b4dd7ecf13c7ad2be5d3c5c22ba70abc642c3971b82ab9bf"}, {0xa8, 0x104, 0xffffffff, "2a4bdae090e8364c2af48293b61a6cc9df57426141002d8eb55b6662d415c8a679f473ff718c1ab75b1733503d3e11f1f49042c46b0dca077d1c91d58f4b5e54e69f947c6baf6d084c486d0dfa4a0773406654236aafdd07a9d450026a6237801e58ff0571e10d0d08a0e894c8375f29a0bba5338f83ee9219cd0cbe96431d93ea32f8fd6dc122bba10d1df188f6ff894787"}, {0xe8, 0x114, 0xffff, "3a78c0902582de9f593d7fab5d7840112cdda1ef32a9361d8ec0b9b1be9ceb25bfbbbef731cac7c1b686f0b08ebf2f4b5ac7c5a4e3c9f60719f0098d9619927e85610592bde57ae4a06d95c48fce04df321b95be9f7bf9e87606a6da1e281aab47efb39722e2a5e42ce87d7941c0e1e1be99494d53ff01ea72cc2a11ef0ed06f5c72e6a74d306ff8685e76f893ebe77e7cc4fe4093520557a9784bbab1e3d4a69343593c531773a648c7669669538e2b465f500cf560d35475c153e81e937dd51f530952566393ea071d7dc839d9c6874500653b30"}], 0x468}}, {{&(0x7f0000000540)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000005c0)="b49a2f4df447e6097e2de11741bfa102899771d0178b67a967b7ebc5d984cdd2171874246fe9affc1ec27674d65e515df613b58797564aab441e5c847b920308ef8738b204ec1bdacdc18f80a2", 0x4d}], 0x1, &(0x7f0000000e80)=[{0x68, 0x112, 0x6, "238a602adb730aa5c2a5017ba840b6ca4535c751ecfc39829d98b74c312c6d07970463fb37ae16ed2d1eb4db30810fba10851efffe7496a8d88c8ca8787a9f8f4fdf1c00ea10a56bc9dc9f10269c9f32febd1efc647be928"}, {0xa8, 0x8, 0x8, "870f079b3233970f92bd71ab2aed854909a09fb6d67bd5adea9effab4bb49863c179bc78e32b0eee8e2dbff4d83ba130152f2e63278f044fe62c017d0538b595fb124a56852244e68da1dbe67b86e9dc4f208e070e0f84e1794357f1bbcdd166c9cd82581dd4817aaba48e42ae0290a48381dfff3af2be4b15b03812f0dfd3a24a16955f0fc686cb5545ef1e13d73b82b13b43"}, {0x100, 0x104, 0x3, "07ab3a174fd7ae236e487afc1dc10ccdc3956a9f7246fd4a747a93ca75583c64d5a42526c41cacf54a0213ecd972d3614bd77bc70c0eb08d33c6f33354514c5b43959669d0268d812a37e94e3da4a3e4821a169e2ab3c1f449ee08d2e192097741e7a6aee0c346c31cdf198ef0949d1e659cf6c06f8c81dcf31478ce2b06befe2aee70bbd5cab0a6e44c44095d85a6f87c2390cb20efb50ccf138c6a532cff872a41f9d98e7ae9150b63abe22a863ed01cac5bddc379e0c0d9b06f2cecf1e7dcdb593e5110737626a18d5901cc4caa471e61bc6de64b4b92f69b08bfac09c97352fd0777d0761ec64ac7fa58"}], 0x210}}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000640)="de6f840ae214aaf6d3bf9d2cf89c40", 0xf}, {&(0x7f0000000680)="71dc462d2420f3ebddf1c279a3f371139b1daac63be26ceae6ccbe2a903a0a41fdc4a4f35d2a022a21c00480833128a1b8c8259c7d82b417d8f44da023db581e5d7bcb4c6a86c7c4bd21f325b4661ff793ab9a9726ecdceacae6e559aec850ddf017affa76e787bf1f13bf777fd9eb09a917715db049fece6a2115acd9762115c06e011884cca00576a4805d8d79ce8dbbc0db5511ae28e41a8322462a7ae1aec8846b9f346fd88ab62bf2ee46631a1644326eae8352658be8260934e3b0336be55eac", 0xc3}, {&(0x7f00000010c0)="422c9e971bd4622562def0c749f1fb4f77f80077985fe08222362a5e2f76a0e429367fa1e20415821236a6339eadca99ad26597e79e5130d0bf1b9db9005589083759a84a77f861c07735279eb56b106993642cfac8f4b0abc3e96f43a7e48b68e1178297ac1ba35bd8c20fcfe96b2a93fb26233b0e354257b3e3717d8eb2248d8f907f70824dba58d936100097a6f3ed951ddcf0efad0ee7d6fcf42cf08dfa1e9faacd6b4a9ef1967c324ed61247509b1fd185b77951ca4ffb026560dbc5fc436d8403d836184543d2e2371fc34de78fff457c300c4f324e39eb34941068dfafc6689bd68a4614119", 0xe9}], 0x3, &(0x7f00000011c0)=[{0x108, 0x78, 0x1ff, "8a8e9de1562085446ed0da71a3f8673b9f28cfb76e335d9645c2d2e038a9a06d2e3e4059d47da7701482704d4225df6afe892d4f7d627f290d450e5ba0b19049a911757cd7ad974f96916eeace6a9a9b6ab6c8bd7066826083d8c56e18e6c89f8ce30b076683ed17cbf00878a389e286311951763a1b429cccbec2ad8e023ec3495dac0141270f9028f333950049192b83e2f5087626009448dd2e69fe70a82e2e9a6329b7429f49b1ee4102198c79080bea4c8bcfc66b0045e3f95a6488c8e1bf4f7734d3bd1cdcfbc64446b7784cf28b3f13dc0fcd8ddea63ddc739aaaefbd67bba53dbc154ae8b42b131b764a4ee067f26ae4c74c"}, {0xb0, 0x118, 0x80000000, "15fd61cddc38210cc1f6bb124ce8a6d48c6b4c7736321de5f2ef3112f97fbf6bc9d52d12b4bb24bf905f9cf885f67edc662473589fee9a8e631f15c7917f9f6d62b705a9556d6f706024a0d3203fccfc770164fdb6cc3347c4dad02c16aef353f9f45c088256c3a83ba35fdf30ba9bdc5b0308de1b4df74d133ea201b95927164387f5dbfd47b14ed0f954c1a1ec8de20ad35bc0a1f4a435fe254edb"}, {0x1010, 0x108, 0x1ff, "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"}, {0xf0, 0x105, 0x81, "5be3ba6f4ed848ac9fd178b35f669c1f038f50f87824b66d7aade6e52c82716ca220c7b171a4d6c2a696c76b7e47bf3d898bc760844fcb4795250f6396d5f097ed39e778c246a1e575dadc7e496bf650254c972823640295dde5c853dcb7cacbbe9d75b1e755c16d664c25e53fba937c66306a7d6eb2ea5349a5471ac11d403615399d055b675d96b9ad7c3f9570b7fc1313e8cf6a6f8b7da8b32f66439a455e429d72dc24b1ce004a9a09a7390f9bdc5ffeab8b9cd49582309d8d28c17df3b76a1c226cecb2ffabdbbeadf985f8356cb15d2107c2ea248fba8c"}], 0x12b8}}, {{&(0x7f00000007c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x4, 0x2, 0x1, {0xa, 0x4e21, 0x2, @local, 0x5}}}, 0x80, &(0x7f0000002580)=[{&(0x7f0000002480)="89dfeebbadb16b964e6d93768fdefb16362efae84a60d35a141cbf13bcb9eea4eedd7fa40557ce9e394e113dcc757fe52737c578de8108b56dbe74378f25e37f8f08a8e2e1b8cc3b4a36b4ea084115747a9e00347ee8f1fa2fbe6d8ff56678d69aecf3d6cfb3bf1091bec1aa1b3b0a65fb1176b179be1682ce1c7c82aaf41dbd8c362033693fd2fe07cc88c436d8f33b7fe1508eb949038d62ad7ee0d974f40a817b67bdffacbcd9604ee9c76470f66a67b20120346d0ef516940cd83ea78b82ffca3e898e287ec5cf", 0xc9}], 0x1}}, {{0x0, 0x0, &(0x7f0000002740)=[{&(0x7f00000025c0)="ac61a0b82a8f95285b69a7d477d3d3745035903421fe46a3097373d517a193b10a295bbd508a9f04ef2f5d6a7d21961063ef20504a9e568a2313209331620c68d30381956f1e2721ec9c2f0b753f2f3f52f855af69e81b88dea414d319363bc75944f1603cd40e03ec1e274872e1b80ca0aa54ded0402aa14bb78e4e9373e052cd67505482b230809ab0d3d3ed97920eed9e546eaf2ccfd626b22fda31162d2a483ec3b67c657a2b8fd87efe33a7026ae94bddbe469fce7a19a30c136fe4dc9580d2d706a8441b504772c2d8e982", 0xce}, {&(0x7f00000026c0)="e4e3e56b9e11566919774a9e77eaa6f2d73cd5234bd2a1181be1652d95db74d91a9d5469dab429b734d543ee774490de6628d5433ca5bd5a40b5a1945652e8391ced1e60ddbefb6bf6ae05161445af990103907ebb08eedd180e4f35164c1e", 0x5f}], 0x2}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000002780)="c8c56d2314d59a4402fd16efcc2b094c500f1b488c458f", 0x17}, {&(0x7f00000027c0)="bd271150fbfdf047f440284902c9304f7d53236a13c5cb74ba4ace20a49601753060034ffb6b79f8a06319", 0x2b}, {&(0x7f0000002800)="18a3b66d79572956491dff221554bd3c6a32bb23fe05ed487eed2d2763b2e9aec83ce7879ece8386e3f3e5c5ec9320ba1b08c8e3c80e4b04b479a1154a74b38c2aa2afc4bc3f4f543b388ddb9c3952636c9e29b5b9be747f6687fb5ccb1afff7eaba601962ce5c984114d7a96cb0174e8493e5ad0c88e35c6360dac5fda137fad68550cb1613805d834634b680380b35d1c6fe999214153aac8ae304ec7a88", 0x9f}], 0x3, &(0x7f0000002900)=[{0x40, 0x1f1, 0x81, "01bf033c3a95693dc6e073c02c81b4d14efef44afde42e5dd24561bb601d43cd3ca07df4aace1b4fb59c"}], 0x40}}, {{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000002940)="cc7651a0e5235859eec9b8fb1c771a66dfb17522b1b7ce3fe7906170b355a02ad0edb08deeff5ba9550be03b4b610208c306b718aeb3795d3e9353776025106db351931d2d0e341a1d389da2e12801c19297f087e90b648808b9df22cee7135ff9281f9c1c4ff0d2a1e9882c2cbf2dd4f78d94fc6a", 0x75}], 0x1}}, {{&(0x7f0000002a00)=@ll={0x11, 0x9, r7, 0x1, 0x80}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002a80)="263770bd085c1c04ad1d5952aee058947318ef1c85d3c47faa1787cce21bc4dbba4a14379d33a5366377c32f256b", 0x2e}, {&(0x7f0000002ac0)="07f2f4854ce4457b687881b4c604783c407a83780ba58a516ca8a1b05a3d679791ba2ccbb8c925", 0x27}, {&(0x7f0000002b00)="a74c959fcf46c4da99afad30555f9c8c5346c98dfaad3d99573796df33b6830f7634320148663e4e894f2f079d378e96d468144ae19e44985a924e8a417df540184e20771b1869ccfd4bc21b33b152adf5dc2eec378c0faab900330e7a34af0ab3242d300f95b6e582231fc71620573a25d17b7248ff9839670d12618f834fe7448ece42258126426ff5345bde978907209f7cef04d3c23c96b24ff89405982702e038e0279618b4b9d126fdc9d151d367b13c6b9b44b810bf0170f319bf4e414b", 0xc1}], 0x3, &(0x7f0000002c40)=[{0x88, 0x118, 0x5, "ee681c6130b666dae9fb210f5a5bf108e17ab404566664690d52dcc84bc58f3c59e1b563b3b4f61b57894d8b6c30cf75907d572396c42c7840f18e54a081fb336efd10c21b2d438f5d1d47af493209aa3be7ca48f9aba6ad2584d356e9de43c4a25b37ca4a0519610b86113cae0639f969"}, {0x98, 0x27, 0xc47a, "d620495360cc544d55b825fc1ab69149e96971788a781c4696aa43be6df445aa25489b3226bb66095dac6ea4f6b9652578546eae4127542e9a71793a4398ac75a7a70c4fa7a967973c4bbc076b3ac12ae1854ac46911fcff973ed75fa646a7b38eb4fee6661cf5bd25888ce3dd6aeb000177b0a067c3ac55bcd02755ea15be28651d42ce"}], 0x120}}, {{&(0x7f0000002d80)=@rc={0x1f, {0x40, 0x3, 0x9, 0x9, 0x9, 0x4}, 0x1b}, 0x80, &(0x7f0000003180)=[{&(0x7f0000002e00)="a770deeccfe22b377b2b3744675c7662191f2b12ba3bdf2c87f6e78ea494bb7a548096806e6a0d35ff40d2ad9f190a1f3a2f5aab3d230ffdcfc24259db8eff1de23958a6a20b7f77179d032f5f0d661e7f4ffec5977602de38d4a115636e1523b52c7fe6e0b4121ddb4f66639672ee27281d20f58800ad4f47df11820df74475b1c28029c9fb237a533f4bb33c514bb3b0b9d263ef597575a6b68ae20740e36f90db585ffc9d85958373", 0xaa}, {&(0x7f0000002ec0)="253af5395cb9f9cf1c362930a6d48d442869c67aa4d555208bed702f6d88241c4577fe6291fbff88ab517b97e1524e975a0af28444b5cbd6377daba7ea9d78928dfdf72923ced54befd0e669092cf626762a1741bb5cd2f2b0bfd2dd3626923e4b16029ec0302c2e1b1f19db2e80444ec697aae432911a7bd79d10e3edd0d189c5a416d5458878fb226f649b64aae0007ce255e5ca6cb38cf387c3b2c5de99e329196c4db2afe823f92e153b43164421ee", 0xb1}, {&(0x7f0000002f80)="7a826dc2a8391d0b7b63fe32aa1d5f56bed7baceaafc0cc881fc8be769c8d8066ce2c250bfcaf85561401c091e33f27cebbce9f9e6d559e6f2e32c4da20776eea690a11938f27ad0f63f5f487dc4ba8fda2eb92b50eadb4ea970f182436e245eabd44472ec62cdd4746441828ad38f0f16d7fc1086944b1d9e117ede816bf052d0403c27dcdaecec111c95e644cfb29a91935c743dceb9f663f208b353b7df7d", 0xa0}, {&(0x7f0000003040)="e748ef68254069d33cce29b8cc3fa1c2efe76ee45a6a1904fd294b18794f6198efdb70dce903846a5a0ceefdc82601a8f7a98f83da9a43c6", 0x38}, {&(0x7f0000003080)="33df126a7568a9ab52fa7ad66739f0c0d3e067e8b5c1226522a58cf269af75d4c1dd2b9e7fca4f31aa4173887da097507b26cb8d3da9a2d5c114f3090893ee2472df02404525dbe0fc4c9b2f9ca5f189030760181fe660bd9aba97bb1cab093b162cd4925ef5785eecf7e922423ab4c086c5ed6b27181b162a4e710ba2cd5ea07ae70fc00f6d3d6ec62ab40c0664706a97417fa05d441f3baaade6f67139c70085528f40a0f73400e88a69514dcf29351baa25342f959c5180a277f323d6cab45f8df2f08ffafad2522dcd2fa32eee49f13b366cb7541e72200ef9ceadfca694a45da194c14edd589e51f38f354a7527aea9754ee943", 0xf6}], 0x5}}], 0x9, 0x0) [ 1417.634340] device nr0 entered promiscuous mode 18:06:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0xa, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x5e8dc848e03962d1, 0x0) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200)=0x9, 0x12) ioctl$SNDRV_PCM_IOCTL_STATUS32(r2, 0x806c4120, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x400000) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r4, 0x28, &(0x7f0000000040)}, 0xffffffffffffffdf) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r5, 0x28, &(0x7f0000000040)}, 0xffffffffffffffdf) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r7, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff21802c0008003950323030302e5c"], 0x15) dup(r7) [ 1417.692332] gfs2: invalid mount option: hostdata= [ 1417.707198] gfs2: can't parse mount arguments 18:06:14 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSACTIVE(r0, 0x40047451, &(0x7f0000000200)={0x2000000000000078, &(0x7f0000000140)=[{0xd9, 0x0, 0x0, 0x1}]}) rt_sigsuspend(&(0x7f0000000180)={0x82}, 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='\x00\x00 \x00\x00\x00\x00\x00\b\x00', 0x600802, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f00000001c0)) [ 1417.755170] device nr0 entered promiscuous mode 18:06:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0xc0, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1417.890572] gfs2: invalid mount option: hostdata= [ 1417.895883] gfs2: can't parse mount arguments 18:06:14 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r2) fstat(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x100, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000400)={[{@hostdata={'hostdata'}}], [{@fowner_gt={'fowner>', r3}}]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="020700000200000000000000000000001f9e61bd01c4609f5c2d4392553faa8f3040127683332f5eddb2025f3e70885d6a259406bc58865711b26acd041e4dccd4477c9d52c9b479ca95e4f655d6cbdbdd030000000000e2c5f951000009cb9c9ef21340440cac1eadb93def086f7bc8641de0993e1e81763a490220d191c7c81c56bc0100008000000000be0058cb01e5e98fcd68e9ade41ffecabea82f21eb3f8de759967b2bbd1565162c6c9d02196c003aaabc61b3960000000000000100641b038030507a48bdfa0b80b55b4851da5df198e82294c14fe0127a118c956837c585785cdebac18a0dca00"/247], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000500)={0x2, 0xb, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x28}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000400)={0x0, 0xffffffffffffff94, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r7}], @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}]}}}]}, 0x40}}, 0x0) sendmmsg(r4, &(0x7f0000003440)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)="89f6d63b1e71e925d41ed1fff3beabdba40a924250d72c7a67cd23407dcfa0c7a9918d0e113c07178872a866739fc868b75741160cd5cabea1ede7c27a70c2f08b46d8917d987514802cef6645043038e4dd5ff744", 0x55}], 0x1, &(0x7f0000000a00)=[{0x108, 0x111, 0x5, "fe2523dc84f419b17e53512d76f3152240e261f92466f7e748792f332abed7048908ad8030cd7772ae9830f0e03f6f2bd41cad5d3058d468166fe68c06cddfa5cc13ab22b3a8cf1c85c272fca7632e84d66e83e0f94bf62f4adeba3a1ce06364a038f7dff4fcee0a0cac4f51f1bd0d5d1bef426e8c0489962b8de29ae724b16ad84b1a1616d17f1f03a7f0dc2bcd8b33d02ea2a8bced9d3475415d207a895eccab87ab7ed1872b20db76c189185814b24348a7d692bd9983a9c8c8e3441a77d29cd3b67d8122e21a9138293a973b44bbc9c870587980cc0b0598e097315d02c02e35249da86cb8c1571a8a9e6d9a301e745d90"}, {0xb0, 0x101, 0x8a6, "fade11cc1e5d4ac9d61c1286b472b63f2c8d95af56bab7b563f0fc4f2987a7b6dd78c813e4421d19ba0498a4ccc911d8ff7732fd02c956d5de082f82fed21f6f308ac9144a7e3d16ee8cb44cbd9032e118f2800fefe2c27a266ab8ec24b0d514ba6df444b30295b7220725205a8995dee6fb8b3db841051dc7f5ed0eb66831e843388485aa67fc58c69edf06e61c5e945e99b0846954326747c2d5"}, {0xb0, 0x10c, 0x7, "fb01fb2556cc56e8c5534a9bd62670dad54b9512f00e7080573f761f6588c31de3c8e51dd7a4f505f13ee73626273f72d58c9ad38ee2fd7b494c6233e78e70b6b12a531f4b35e4a9809de6617b798047208bdd62e09785f3f790075a93cf79e69aaf363c8d9df395360414de4ab53d46862a6d0a54ebb24d5e03434e3ec99cc6df2c5f1cd68fc5b8e0dfe8ccea4e93d1853005dc34745a945810ea"}, {0x70, 0x0, 0x80000001, "bbe3b07f6774f2cf93d7191697af681c0a7a8430073bcf0504089441cd77982edf3ad315f61c6718aaabeade31513b4fde318d1ee6947bbb0b30b4b4b6f8e5ce4d25940504f095b4dd7ecf13c7ad2be5d3c5c22ba70abc642c3971b82ab9bf"}, {0xa8, 0x104, 0xffffffff, "2a4bdae090e8364c2af48293b61a6cc9df57426141002d8eb55b6662d415c8a679f473ff718c1ab75b1733503d3e11f1f49042c46b0dca077d1c91d58f4b5e54e69f947c6baf6d084c486d0dfa4a0773406654236aafdd07a9d450026a6237801e58ff0571e10d0d08a0e894c8375f29a0bba5338f83ee9219cd0cbe96431d93ea32f8fd6dc122bba10d1df188f6ff894787"}, {0xe8, 0x114, 0xffff, "3a78c0902582de9f593d7fab5d7840112cdda1ef32a9361d8ec0b9b1be9ceb25bfbbbef731cac7c1b686f0b08ebf2f4b5ac7c5a4e3c9f60719f0098d9619927e85610592bde57ae4a06d95c48fce04df321b95be9f7bf9e87606a6da1e281aab47efb39722e2a5e42ce87d7941c0e1e1be99494d53ff01ea72cc2a11ef0ed06f5c72e6a74d306ff8685e76f893ebe77e7cc4fe4093520557a9784bbab1e3d4a69343593c531773a648c7669669538e2b465f500cf560d35475c153e81e937dd51f530952566393ea071d7dc839d9c6874500653b30"}], 0x468}}, {{&(0x7f0000000540)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}, 0x80, &(0x7f00000004c0)=[{&(0x7f00000005c0)="b49a2f4df447e6097e2de11741bfa102899771d0178b67a967b7ebc5d984cdd2171874246fe9affc1ec27674d65e515df613b58797564aab441e5c847b920308ef8738b204ec1bdacdc18f80a2", 0x4d}], 0x1, &(0x7f0000000e80)=[{0x68, 0x112, 0x6, "238a602adb730aa5c2a5017ba840b6ca4535c751ecfc39829d98b74c312c6d07970463fb37ae16ed2d1eb4db30810fba10851efffe7496a8d88c8ca8787a9f8f4fdf1c00ea10a56bc9dc9f10269c9f32febd1efc647be928"}, {0xa8, 0x8, 0x8, "870f079b3233970f92bd71ab2aed854909a09fb6d67bd5adea9effab4bb49863c179bc78e32b0eee8e2dbff4d83ba130152f2e63278f044fe62c017d0538b595fb124a56852244e68da1dbe67b86e9dc4f208e070e0f84e1794357f1bbcdd166c9cd82581dd4817aaba48e42ae0290a48381dfff3af2be4b15b03812f0dfd3a24a16955f0fc686cb5545ef1e13d73b82b13b43"}, {0x100, 0x104, 0x3, "07ab3a174fd7ae236e487afc1dc10ccdc3956a9f7246fd4a747a93ca75583c64d5a42526c41cacf54a0213ecd972d3614bd77bc70c0eb08d33c6f33354514c5b43959669d0268d812a37e94e3da4a3e4821a169e2ab3c1f449ee08d2e192097741e7a6aee0c346c31cdf198ef0949d1e659cf6c06f8c81dcf31478ce2b06befe2aee70bbd5cab0a6e44c44095d85a6f87c2390cb20efb50ccf138c6a532cff872a41f9d98e7ae9150b63abe22a863ed01cac5bddc379e0c0d9b06f2cecf1e7dcdb593e5110737626a18d5901cc4caa471e61bc6de64b4b92f69b08bfac09c97352fd0777d0761ec64ac7fa58"}], 0x210}}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000640)="de6f840ae214aaf6d3bf9d2cf89c40", 0xf}, {&(0x7f0000000680)="71dc462d2420f3ebddf1c279a3f371139b1daac63be26ceae6ccbe2a903a0a41fdc4a4f35d2a022a21c00480833128a1b8c8259c7d82b417d8f44da023db581e5d7bcb4c6a86c7c4bd21f325b4661ff793ab9a9726ecdceacae6e559aec850ddf017affa76e787bf1f13bf777fd9eb09a917715db049fece6a2115acd9762115c06e011884cca00576a4805d8d79ce8dbbc0db5511ae28e41a8322462a7ae1aec8846b9f346fd88ab62bf2ee46631a1644326eae8352658be8260934e3b0336be55eac", 0xc3}, {&(0x7f00000010c0)="422c9e971bd4622562def0c749f1fb4f77f80077985fe08222362a5e2f76a0e429367fa1e20415821236a6339eadca99ad26597e79e5130d0bf1b9db9005589083759a84a77f861c07735279eb56b106993642cfac8f4b0abc3e96f43a7e48b68e1178297ac1ba35bd8c20fcfe96b2a93fb26233b0e354257b3e3717d8eb2248d8f907f70824dba58d936100097a6f3ed951ddcf0efad0ee7d6fcf42cf08dfa1e9faacd6b4a9ef1967c324ed61247509b1fd185b77951ca4ffb026560dbc5fc436d8403d836184543d2e2371fc34de78fff457c300c4f324e39eb34941068dfafc6689bd68a4614119", 0xe9}], 0x3, &(0x7f00000011c0)=[{0x108, 0x78, 0x1ff, "8a8e9de1562085446ed0da71a3f8673b9f28cfb76e335d9645c2d2e038a9a06d2e3e4059d47da7701482704d4225df6afe892d4f7d627f290d450e5ba0b19049a911757cd7ad974f96916eeace6a9a9b6ab6c8bd7066826083d8c56e18e6c89f8ce30b076683ed17cbf00878a389e286311951763a1b429cccbec2ad8e023ec3495dac0141270f9028f333950049192b83e2f5087626009448dd2e69fe70a82e2e9a6329b7429f49b1ee4102198c79080bea4c8bcfc66b0045e3f95a6488c8e1bf4f7734d3bd1cdcfbc64446b7784cf28b3f13dc0fcd8ddea63ddc739aaaefbd67bba53dbc154ae8b42b131b764a4ee067f26ae4c74c"}, {0xb0, 0x118, 0x80000000, "15fd61cddc38210cc1f6bb124ce8a6d48c6b4c7736321de5f2ef3112f97fbf6bc9d52d12b4bb24bf905f9cf885f67edc662473589fee9a8e631f15c7917f9f6d62b705a9556d6f706024a0d3203fccfc770164fdb6cc3347c4dad02c16aef353f9f45c088256c3a83ba35fdf30ba9bdc5b0308de1b4df74d133ea201b95927164387f5dbfd47b14ed0f954c1a1ec8de20ad35bc0a1f4a435fe254edb"}, {0x1010, 0x108, 0x1ff, "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"}, {0xf0, 0x105, 0x81, "5be3ba6f4ed848ac9fd178b35f669c1f038f50f87824b66d7aade6e52c82716ca220c7b171a4d6c2a696c76b7e47bf3d898bc760844fcb4795250f6396d5f097ed39e778c246a1e575dadc7e496bf650254c972823640295dde5c853dcb7cacbbe9d75b1e755c16d664c25e53fba937c66306a7d6eb2ea5349a5471ac11d403615399d055b675d96b9ad7c3f9570b7fc1313e8cf6a6f8b7da8b32f66439a455e429d72dc24b1ce004a9a09a7390f9bdc5ffeab8b9cd49582309d8d28c17df3b76a1c226cecb2ffabdbbeadf985f8356cb15d2107c2ea248fba8c"}], 0x12b8}}, {{&(0x7f00000007c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x4, 0x2, 0x1, {0xa, 0x4e21, 0x2, @local, 0x5}}}, 0x80, &(0x7f0000002580)=[{&(0x7f0000002480)="89dfeebbadb16b964e6d93768fdefb16362efae84a60d35a141cbf13bcb9eea4eedd7fa40557ce9e394e113dcc757fe52737c578de8108b56dbe74378f25e37f8f08a8e2e1b8cc3b4a36b4ea084115747a9e00347ee8f1fa2fbe6d8ff56678d69aecf3d6cfb3bf1091bec1aa1b3b0a65fb1176b179be1682ce1c7c82aaf41dbd8c362033693fd2fe07cc88c436d8f33b7fe1508eb949038d62ad7ee0d974f40a817b67bdffacbcd9604ee9c76470f66a67b20120346d0ef516940cd83ea78b82ffca3e898e287ec5cf", 0xc9}], 0x1}}, {{0x0, 0x0, &(0x7f0000002740)=[{&(0x7f00000025c0)="ac61a0b82a8f95285b69a7d477d3d3745035903421fe46a3097373d517a193b10a295bbd508a9f04ef2f5d6a7d21961063ef20504a9e568a2313209331620c68d30381956f1e2721ec9c2f0b753f2f3f52f855af69e81b88dea414d319363bc75944f1603cd40e03ec1e274872e1b80ca0aa54ded0402aa14bb78e4e9373e052cd67505482b230809ab0d3d3ed97920eed9e546eaf2ccfd626b22fda31162d2a483ec3b67c657a2b8fd87efe33a7026ae94bddbe469fce7a19a30c136fe4dc9580d2d706a8441b504772c2d8e982", 0xce}, {&(0x7f00000026c0)="e4e3e56b9e11566919774a9e77eaa6f2d73cd5234bd2a1181be1652d95db74d91a9d5469dab429b734d543ee774490de6628d5433ca5bd5a40b5a1945652e8391ced1e60ddbefb6bf6ae05161445af990103907ebb08eedd180e4f35164c1e", 0x5f}], 0x2}}, {{0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000002780)="c8c56d2314d59a4402fd16efcc2b094c500f1b488c458f", 0x17}, {&(0x7f00000027c0)="bd271150fbfdf047f440284902c9304f7d53236a13c5cb74ba4ace20a49601753060034ffb6b79f8a06319", 0x2b}, {&(0x7f0000002800)="18a3b66d79572956491dff221554bd3c6a32bb23fe05ed487eed2d2763b2e9aec83ce7879ece8386e3f3e5c5ec9320ba1b08c8e3c80e4b04b479a1154a74b38c2aa2afc4bc3f4f543b388ddb9c3952636c9e29b5b9be747f6687fb5ccb1afff7eaba601962ce5c984114d7a96cb0174e8493e5ad0c88e35c6360dac5fda137fad68550cb1613805d834634b680380b35d1c6fe999214153aac8ae304ec7a88", 0x9f}], 0x3, &(0x7f0000002900)=[{0x40, 0x1f1, 0x81, "01bf033c3a95693dc6e073c02c81b4d14efef44afde42e5dd24561bb601d43cd3ca07df4aace1b4fb59c"}], 0x40}}, {{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000002940)="cc7651a0e5235859eec9b8fb1c771a66dfb17522b1b7ce3fe7906170b355a02ad0edb08deeff5ba9550be03b4b610208c306b718aeb3795d3e9353776025106db351931d2d0e341a1d389da2e12801c19297f087e90b648808b9df22cee7135ff9281f9c1c4ff0d2a1e9882c2cbf2dd4f78d94fc6a", 0x75}], 0x1}}, {{&(0x7f0000002a00)=@ll={0x11, 0x9, r7, 0x1, 0x80}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002a80)="263770bd085c1c04ad1d5952aee058947318ef1c85d3c47faa1787cce21bc4dbba4a14379d33a5366377c32f256b", 0x2e}, {&(0x7f0000002ac0)="07f2f4854ce4457b687881b4c604783c407a83780ba58a516ca8a1b05a3d679791ba2ccbb8c925", 0x27}, {&(0x7f0000002b00)="a74c959fcf46c4da99afad30555f9c8c5346c98dfaad3d99573796df33b6830f7634320148663e4e894f2f079d378e96d468144ae19e44985a924e8a417df540184e20771b1869ccfd4bc21b33b152adf5dc2eec378c0faab900330e7a34af0ab3242d300f95b6e582231fc71620573a25d17b7248ff9839670d12618f834fe7448ece42258126426ff5345bde978907209f7cef04d3c23c96b24ff89405982702e038e0279618b4b9d126fdc9d151d367b13c6b9b44b810bf0170f319bf4e414b", 0xc1}], 0x3, &(0x7f0000002c40)=[{0x88, 0x118, 0x5, "ee681c6130b666dae9fb210f5a5bf108e17ab404566664690d52dcc84bc58f3c59e1b563b3b4f61b57894d8b6c30cf75907d572396c42c7840f18e54a081fb336efd10c21b2d438f5d1d47af493209aa3be7ca48f9aba6ad2584d356e9de43c4a25b37ca4a0519610b86113cae0639f969"}, {0x98, 0x27, 0xc47a, "d620495360cc544d55b825fc1ab69149e96971788a781c4696aa43be6df445aa25489b3226bb66095dac6ea4f6b9652578546eae4127542e9a71793a4398ac75a7a70c4fa7a967973c4bbc076b3ac12ae1854ac46911fcff973ed75fa646a7b38eb4fee6661cf5bd25888ce3dd6aeb000177b0a067c3ac55bcd02755ea15be28651d42ce"}], 0x120}}, {{&(0x7f0000002d80)=@rc={0x1f, {0x40, 0x3, 0x9, 0x9, 0x9, 0x4}, 0x1b}, 0x80, &(0x7f0000003180)=[{&(0x7f0000002e00)="a770deeccfe22b377b2b3744675c7662191f2b12ba3bdf2c87f6e78ea494bb7a548096806e6a0d35ff40d2ad9f190a1f3a2f5aab3d230ffdcfc24259db8eff1de23958a6a20b7f77179d032f5f0d661e7f4ffec5977602de38d4a115636e1523b52c7fe6e0b4121ddb4f66639672ee27281d20f58800ad4f47df11820df74475b1c28029c9fb237a533f4bb33c514bb3b0b9d263ef597575a6b68ae20740e36f90db585ffc9d85958373", 0xaa}, {&(0x7f0000002ec0)="253af5395cb9f9cf1c362930a6d48d442869c67aa4d555208bed702f6d88241c4577fe6291fbff88ab517b97e1524e975a0af28444b5cbd6377daba7ea9d78928dfdf72923ced54befd0e669092cf626762a1741bb5cd2f2b0bfd2dd3626923e4b16029ec0302c2e1b1f19db2e80444ec697aae432911a7bd79d10e3edd0d189c5a416d5458878fb226f649b64aae0007ce255e5ca6cb38cf387c3b2c5de99e329196c4db2afe823f92e153b43164421ee", 0xb1}, {&(0x7f0000002f80)="7a826dc2a8391d0b7b63fe32aa1d5f56bed7baceaafc0cc881fc8be769c8d8066ce2c250bfcaf85561401c091e33f27cebbce9f9e6d559e6f2e32c4da20776eea690a11938f27ad0f63f5f487dc4ba8fda2eb92b50eadb4ea970f182436e245eabd44472ec62cdd4746441828ad38f0f16d7fc1086944b1d9e117ede816bf052d0403c27dcdaecec111c95e644cfb29a91935c743dceb9f663f208b353b7df7d", 0xa0}, {&(0x7f0000003040)="e748ef68254069d33cce29b8cc3fa1c2efe76ee45a6a1904fd294b18794f6198efdb70dce903846a5a0ceefdc82601a8f7a98f83da9a43c6", 0x38}, {&(0x7f0000003080)="33df126a7568a9ab52fa7ad66739f0c0d3e067e8b5c1226522a58cf269af75d4c1dd2b9e7fca4f31aa4173887da097507b26cb8d3da9a2d5c114f3090893ee2472df02404525dbe0fc4c9b2f9ca5f189030760181fe660bd9aba97bb1cab093b162cd4925ef5785eecf7e922423ab4c086c5ed6b27181b162a4e710ba2cd5ea07ae70fc00f6d3d6ec62ab40c0664706a97417fa05d441f3baaade6f67139c70085528f40a0f73400e88a69514dcf29351baa25342f959c5180a277f323d6cab45f8df2f08ffafad2522dcd2fa32eee49f13b366cb7541e72200ef9ceadfca694a45da194c14edd589e51f38f354a7527aea9754ee943", 0xf6}], 0x5}}], 0x9, 0x0) 18:06:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') socket$inet(0x2, 0x2, 0x7) syz_mount_image$nfs(&(0x7f0000000080)='nfs\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x1, 0x6, &(0x7f00000016c0)=[{&(0x7f0000000100)="4fd679f54122fcd49aab9898c56144fb6f7bf6960c6bc2829ef0ff7c431f95aa6df697e1e5d1a4341de0a207c308f78da4e61fe5a6a605a7758a99", 0x3b, 0x7}, {&(0x7f0000000180)="3db6a73868dfbf21837f1e84f0f339c9829beb173529d5b8f20a276a0d6bccd2fdfc652ca6319c71d007db5c39471dbd9ac65c24509cc67543d5087fee0fc417ad788c4a09884ab54c7f166fc5e9087e72e38b71a195cb1aafb24a", 0x5b, 0x1c3b}, {&(0x7f0000000240)="bc07b768cf69397c73be4ce775e5a4bcc78f979048305691c25f60b8b9", 0x1d, 0xfdce}, {&(0x7f0000000300)="cf77bcf943d5e0f4a8591aec92b6b0f9cfbe8bbf524850bccccc439393a6d02aa453a329e57e46747cee25acd30516b187feeb328a30c3972476db3a9e771e61fef45ee989e78a5359e3382f6e50815a93d49cc841a71907227875cfeccf180e43bdf0d2d41d59cf115519325ef2b06c15a4210dcaeb8e695786c0f0e841cf9504773b2095a7af55ba8f96dd4321e065f0c8edc4a3b89f92e9161ded0c4e5e206729dab755718fa42e57cc8b883423269a1cb45a17434d8d6732d3ad58da88e857e5dff4d2ee972eb5766d52ed67d6e5561110a6f667cc37083a5db1c9fcf7f41e380644ef166adbd9aefe", 0xeb, 0x1}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000004c0)="876474dec8472809319703522126c91e6c46b7f4b4977e31292fe07565e00613b6909553e31c7fc1de8beedd6a2f14ada687e13ec6d204f8c7ccd95af7819fac5b9a411cdd92a325", 0x48, 0x3}], 0x800, &(0x7f0000001780)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0xec0, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1418.232515] net_ratelimit: 10 callbacks suppressed [ 1418.232523] protocol 88fb is buggy, dev hsr_slave_0 [ 1418.242737] protocol 88fb is buggy, dev hsr_slave_1 [ 1418.288912] gfs2: invalid mount option: hostdata= [ 1418.332515] gfs2: can't parse mount arguments 18:06:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:15 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r4, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x2000027c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:15 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={0x0, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect={0x5}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'veth1\x00', 0x0}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x80800, 0x0) r4 = socket(0x2000000011, 0x4000000000080002, 0x0) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r5, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @remote}}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x40}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffffffc0}]}, 0x40}, 0x1, 0x0, 0x0, 0x4044010}, 0x100e1) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8102401}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, r5, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20002000}, 0x4000) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0xfffffffffffffd86, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="70000000240001041000000020000063895bea1a", @ANYRES32=r2, @ANYBLOB="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"], 0x70}}, 0x0) 18:06:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) ioctl$FBIOGET_FSCREENINFO(r1, 0x4602, &(0x7f0000000080)) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1419.067050] device nr0 entered promiscuous mode [ 1419.089058] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1419.112548] protocol 88fb is buggy, dev hsr_slave_0 [ 1419.117720] protocol 88fb is buggy, dev hsr_slave_1 [ 1419.122936] protocol 88fb is buggy, dev hsr_slave_0 [ 1419.128535] protocol 88fb is buggy, dev hsr_slave_1 [ 1419.133736] protocol 88fb is buggy, dev hsr_slave_0 18:06:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x7ffff000, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1419.138895] protocol 88fb is buggy, dev hsr_slave_1 [ 1419.197093] device nr0 entered promiscuous mode 18:06:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0189436, &(0x7f0000000040)) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r1, r2, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r1, r0, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x18, 0x0, 0x300, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x23b, 0x10000}], 0x3, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x40, 0x6) ioctl$TCGETA(r4, 0x5405, &(0x7f00000000c0)) 18:06:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1419.310514] kauditd_printk_skb: 13 callbacks suppressed [ 1419.310532] audit: type=1804 audit(1577124375.857:4104): pid=2116 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/410/file0/file0" dev="loop2" ino=1733 res=1 18:06:15 executing program 5: epoll_create(0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x24}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="c700000034002908000006000000000003000000c70000003b000100ffff0000000000000000b5060806fff2"], 0xfde8}, 0x1, 0xffffff7f0e000000}, 0x0) [ 1419.362340] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b10efd9a devid 1369094286720630784 transid 0 /dev/loop0 [ 1419.401790] BTRFS error (device loop0): superblock checksum mismatch [ 1419.425046] BTRFS error (device loop0): open_ctree failed 18:06:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="eb3c906d6b66732e666174000204010002000270fff82e8597daa7c39064f23429fc1b68d261f3da466843078fa2cae76fd33c28317d6a3c7c8703", 0xfffffffffffffdc4, 0xfffffffffffffffc}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x810a4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x5) [ 1419.513999] BTRFS error (device loop0): superblock checksum mismatch [ 1419.574747] netlink: 99 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1419.603575] openvswitch: netlink: Message has 4 unknown bytes. [ 1419.646874] netlink: 99 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1419.672605] protocol 88fb is buggy, dev hsr_slave_0 [ 1419.680622] BTRFS error (device loop0): open_ctree failed 18:06:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x2, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:16 executing program 5: epoll_create(0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x24}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="c700000034002908000006000000000003000000c70000003b000100ffff0000000000000000b5060806fff2"], 0xfde8}, 0x1, 0xffffff7f0e000000}, 0x0) [ 1419.975694] netlink: 99 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1420.131602] FAT-fs (loop2): count of clusters too big (8728062) [ 1420.142809] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1420.395401] audit: type=1804 audit(1577124376.947:4105): pid=2151 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/411/file0" dev="sda1" ino=17217 res=1 18:06:17 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0189436, &(0x7f0000000040)) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r1, r2, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r1, r0, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x18, 0x0, 0x300, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed02000a0000000001004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x23b, 0x10000}], 0x3, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x40, 0x6) ioctl$TCGETA(r4, 0x5405, &(0x7f00000000c0)) 18:06:17 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={0x0, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x3, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:17 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="1c00000025009b8814e5f407573b0400020000000300000000000000", 0x1c) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffc72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_open_pts(0xffffffffffffffff, 0x80) ioctl$GIO_UNIMAP(r1, 0x4b66, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsu\x00', 0x200000, 0x0) ioctl$TIOCNOTTY(r4, 0x5422) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x101], 0x1f004}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) r7 = getpid() r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r8, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r7, r8, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r9}, 0x30) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 18:06:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400000) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x74df2837fe3b3ba4, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000000c0)={0x2, r2}) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1420.601532] device nr0 entered promiscuous mode [ 1420.612050] BTRFS error (device loop0): superblock checksum mismatch [ 1420.691080] BTRFS error (device loop0): open_ctree failed 18:06:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x8, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1420.751591] device nr0 entered promiscuous mode 18:06:17 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000040)={0x6390}) r1 = socket(0x10, 0x803, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) rt_sigreturn() getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000810003b0e000000000000e7985c8be92600000200000000", @ANYRES32=0x0, @ANYBLOB="fac5", @ANYRES32=0x6, @ANYBLOB="20001200100001006970366772657461700000000c00020008000100", @ANYRES32=r2], 0x48}}, 0x0) fadvise64(0xffffffffffffffff, 0xffffffffffffff01, 0x1, 0x5) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r3, 0x0, 0x20004850) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r4, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x9}, 0x4000004) 18:06:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x9, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='cr\x00\x00\x00\x00\x19') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x10, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:17 executing program 0: perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000240)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) socket$inet(0x2, 0x3, 0x9) close(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x3, &(0x7f0000000040)=[{0x8, 0x1, 0x1, 0xf276}, {0x7fff, 0x7, 0x5, 0x200}, {0x7fff, 0xfb, 0x3f, 0x4}]}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x80) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) creat(&(0x7f0000000200)='./file0\x00', 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="000000f21301ce646ba1a34578d3abdf1e155667018001000000000067a2b4ecb75c5280fbca3ce9bbdc7e507976393196a1469f19f444f39200881b8afef96dbcbe63cb975d3b9983c3d54c3a794ec359a42e9c72d1369f22ee5c50c84688e04a145104f2f518453bec82bd0b54fdcb0a7bc4ac6cc4ea5f6506cb8e7280b85b22b167c2936a59ce61a000b10079795d86c292671cf2b3576b8c24dc5d84e0f9f17e6b890649994eaf071e4ca8ac2d6ce78e7ff14cc19e03274605baf2fffa6ad12c42b01f688768648830bf39d99954416c57cf74e8421b1dbc1b40047f86e4779d222e50fa4e49c37913dd6103cac3f98b3a615b73192fb49a95b0a85ebd6585318fa9142aeb774ebd40ff425fa31665efbd1b22000000000000144af77d5e7d4ef82ef1a48f85ae5f58e9c3ace6b8fb34dcb11d89f7beaaa3ea6dc230ed1bb7fe99e7efe975cddcb93b096e221a1ae9355dd833e63049945b5e5fa2d65518a375ad9d1ad7a169e8fb2e4c6be2dba9f82445099ede2703c442879bdafa0ea3c6059de0494ae4918bad0753110dbc1b358ea4293d3d76ea70a72b93dfe227499a199c55d3c38a66196e620b4dd0ba68de04110f9feb49bc589654d3d919259a4db4dec77cb80956cfa05c3a92bcfc213f50f056ae4cc65ccaba950a623212ced1ad3d8ef0ff84a9e7935de1c2d26f1013f08fb3d4210c00bc0d41ffb7eca317867697891562ad56690a157c59a1b6dd5c9d48105de6951dcf05e87267aaa63ec53e801c74974b6405ed8dbee753ef77c807efdc6ede78"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) epoll_create(0x0) creat(0x0, 0x0) stat(0x0, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000180)=""/109, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000380)=""/107, 0x0}) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000480)=ANY=[]) [ 1421.646170] audit: type=1804 audit(1577124378.197:4106): pid=2215 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/413/file0/file0" dev="loop2" ino=1734 res=1 18:06:18 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x300, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0xff, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000080)={0x7, {0x1d, 0x4, 0x800, 0x69}, {0x9, 0x8064, 0x8, 0x8}, {0x5, 0xcf52}}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x800, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c90", 0x3}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="64067331ffffff7f0000000000"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x400000) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r3, &(0x7f0000000040)="900c9bc126a0f51efd6a28fd735d2068d3f54e27", &(0x7f0000000100)=""/33, 0x4}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 18:06:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1e84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10020, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$llc(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) open(0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000923000)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc7, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00004d1ff0)='/dev/sequencer2\x00', 0x1, 0x0) close(r0) close(r1) 18:06:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:18 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x2, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1422.220335] FAT-fs (loop0): Unrecognized mount option "ds1ÿÿÿ" or missing value [ 1422.247476] device nr0 entered promiscuous mode 18:06:18 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket(0xa, 0x0, 0x8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r1, 0x0, 0x20004850) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000080)=0x3, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x8e) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xec}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b454283", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) syz_open_dev$cec(0x0, 0x1, 0x2) socket$inet6_sctp(0xa, 0x0, 0x84) r2 = socket(0xa, 0x0, 0x8) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r2, 0x0, 0x20004850) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f00000000c0)={0x3, 0x7, "24ba79", 0xc, 0x6}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x40000000}, 0x0) [ 1422.311260] FAT-fs (loop0): Unrecognized mount option "ds1ÿÿÿ" or missing value [ 1422.337824] device nr0 entered promiscuous mode 18:06:19 executing program 0: ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000380)="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") syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000001c0)={0x0, 0x0, 0x242, r1, 0x0, &(0x7f0000000180)={0xa10902, 0xfffffff9, [], @p_u16=&(0x7f0000000140)=0x200}}) openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bsg\x00', 0x200, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000240)={r2, 0x0, 0x9, r3}) [ 1422.466001] audit: type=1804 audit(1577124379.017:4107): pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/414/file0/file0" dev="loop2" ino=1735 res=1 18:06:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x3, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1423.062613] audit: type=1804 audit(1577124379.607:4108): pid=2310 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/415/file0/file0" dev="loop2" ino=1736 res=1 18:06:19 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x4, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:19 executing program 5: r0 = getpid() ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x8000) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x9, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={0x0, r1, 0x0, 0x55b50b4e, 0x0}, 0x30) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)='TRUE', 0x4, 0x1) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) dup(0xffffffffffffffff) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x602100, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r5, 0x80045017, &(0x7f0000000040)) ioctl$KVM_RUN(r4, 0xae80, 0x0) r6 = dup3(r2, r3, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000006c0), 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r6, 0x112, 0xd, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup2(r6, r4) 18:06:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x2080020, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7f, 0x65bb91c86af691d4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe317, 0x0, @perf_config_ext={0x1, 0x1ff}, 0x0, 0x200000000000, 0x0, 0x4, 0xfffffffffffffc01}, 0x0, 0xd, 0xffffffffffffffff, 0x8) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:19 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpid() getpgid(0x0) ioprio_get$pid(0x2, 0x0) r1 = getpgid(0x0) ioprio_get$pid(0x2, 0x0) rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) capget(&(0x7f0000000080)={0x20080522}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89e1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000100), 0x8) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)='/dev/kvm\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, r6) r7 = dup3(r2, r3, 0x0) dup2(r7, r5) 18:06:20 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xa, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1423.610481] device nr0 entered promiscuous mode [ 1423.676412] audit: type=1804 audit(1577124380.227:4109): pid=2323 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/416/file0/file0" dev="sda1" ino=17485 res=1 18:06:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0189436, &(0x7f0000000040)) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, &(0x7f0000000100)=""/32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r3, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r3, r2, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000080)={0x9, 0x4, 0x6, 0x9, '\x00', 0x20e}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1423.758506] device nr0 entered promiscuous mode [ 1423.833243] net_ratelimit: 13 callbacks suppressed [ 1423.833268] protocol 88fb is buggy, dev hsr_slave_0 [ 1423.843894] protocol 88fb is buggy, dev hsr_slave_1 [ 1423.850308] protocol 88fb is buggy, dev hsr_slave_0 [ 1423.855656] protocol 88fb is buggy, dev hsr_slave_1 18:06:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xe, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:20 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpid() getpgid(0x0) ioprio_get$pid(0x2, 0x0) r1 = getpgid(0x0) ioprio_get$pid(0x2, 0x0) rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) capget(&(0x7f0000000080)={0x20080522}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89e1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000100), 0x8) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)='/dev/kvm\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, r6) r7 = dup3(r2, r3, 0x0) dup2(r7, r5) 18:06:20 executing program 5: socket$inet6(0xa, 0x400000000005, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_FPEMU(0xa, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) r2 = socket(0x1, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) setresuid(0x0, r3, r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setresgid(0x0, r5, r6) lchown(0x0, r3, r5) rmdir(&(0x7f0000000040)='./file0\x00') dup2(r0, r1) 18:06:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xf, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1424.206824] audit: type=1804 audit(1577124380.757:4110): pid=2365 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/417/file0/file0" dev="loop2" ino=1737 res=1 18:06:21 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(0x0, 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) ioctl$SNDCTL_DSP_GETOSPACE(r2, 0x8010500c, &(0x7f0000000080)) 18:06:21 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) bind$bt_rfcomm(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000b80)={0x0, 0x0}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) r4 = socket(0xa, 0x40003, 0x8) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r4, 0x0, 0x20004850) getsockname$tipc(r4, &(0x7f00000000c0)=@name, &(0x7f0000000140)=0x10) sendfile(r1, r3, 0x0, 0x80001d00c0d0) 18:06:21 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) getpid() getpgid(0x0) ioprio_get$pid(0x2, 0x0) r1 = getpgid(0x0) ioprio_get$pid(0x2, 0x0) rt_tgsigqueueinfo(0x0, r1, 0x0, 0x0) capget(&(0x7f0000000080)={0x20080522}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x89e1, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000100), 0x8) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)='/dev/kvm\x00', 0xfffffffffffffffc) keyctl$assume_authority(0x10, r6) r7 = dup3(r2, r3, 0x0) dup2(r7, r5) 18:06:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x60, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:21 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1425.014690] device nr0 entered promiscuous mode 18:06:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xf0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1425.156568] audit: type=1804 audit(1577124381.707:4111): pid=2422 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/418/file0/file0" dev="loop2" ino=1738 res=1 18:06:21 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) bind$bt_rfcomm(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc028aa03, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000b80)={0x0, 0x0}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000200)) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) r4 = socket(0xa, 0x40003, 0x8) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r4, 0x0, 0x20004850) getsockname$tipc(r4, &(0x7f00000000c0)=@name, &(0x7f0000000140)=0x10) sendfile(r1, r3, 0x0, 0x80001d00c0d0) [ 1425.278991] audit: type=1800 audit(1577124381.747:4112): pid=2424 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17601 res=0 [ 1425.352943] protocol 88fb is buggy, dev hsr_slave_0 [ 1425.358732] protocol 88fb is buggy, dev hsr_slave_1 [ 1425.364691] protocol 88fb is buggy, dev hsr_slave_0 [ 1425.370280] protocol 88fb is buggy, dev hsr_slave_1 [ 1425.376170] protocol 88fb is buggy, dev hsr_slave_0 [ 1425.381910] protocol 88fb is buggy, dev hsr_slave_1 18:06:22 executing program 0: epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x60, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x19b00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000300), &(0x7f0000000380)=0x80) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$dri(0x0, 0x0, 0x0) creat(0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan1\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="20000000caffa9ff2349cef41811000d040080004d4000000000000000", @ANYRES32=r4, @ANYBLOB="79d8991f8ccfcc5f0e73df776f324567c80718fc36e4aba6ea42d732bca1281bc116cae04f0b0e7935ac1d"], 0x25c}}, 0x0) [ 1425.602265] device nr0 entered promiscuous mode [ 1425.666455] selinux_nlmsg_perm: 20 callbacks suppressed [ 1425.666494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65482 sclass=netlink_route_socket pig=2442 comm=syz-executor.0 18:06:22 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) setxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8001}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001a000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0189436, &(0x7f0000000040)) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) r8 = socket(0xa, 0x0, 0x8) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r8, 0x0, 0x20004850) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000440)={0x6, 0x1, 0x4, 0x8, 0x27ff, {r6, r7/1000+30000}, {0x5, 0x2, 0x2, 0x3f, 0xf4, 0x3, "dbe30842"}, 0x96, 0x2, @planes=&(0x7f0000000300)={0x9, 0x9, @mem_offset=0x40, 0x1}, 0x65, 0x0, r8}) fchmodat(r9, &(0x7f0000000340)='./file0\x00', 0x40) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r4, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r4, r3, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r3, 0x80184151, &(0x7f0000000240)={0x0, &(0x7f00000001c0)="c5bbd4ce118dde20701dd00d5015fd546eb78f5615dd17b54ea6e9e6a8ac2f7c1fb4d70fd82da63e56502c6d04202b22011976e46e00", 0x36}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r11 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x2, 0x0, 0x1000, &(0x7f0000021000/0x1000)=nil}) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_REGS(r11, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r11, 0xae80, 0x0) ioctl$KVM_RUN(r11, 0xae80, 0x0) 18:06:22 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7083}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, 0xffffffffffffffff) sendfile(r1, r2, 0x0, 0x0) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r3, 0x0, 0x20004850) setsockopt$packet_buf(r3, 0x107, 0x1, &(0x7f00000000c0)="3d9061fa5a9531c4abd97162626b0b7a4c1ea501f2b426", 0x17) r4 = dup3(r3, r0, 0x0) ioctl$SIOCX25SENDCALLACCPT(r4, 0x89e9) 18:06:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB='b\x00rfs.\x00'], &(0x7f0000000100)='ppp0(-$-cpusetvboxnet0em1.em1\x00', 0x1e, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x2, 0x8) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:22 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(0x0, 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x300, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:22 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00'}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1426.112168] device nr0 entered promiscuous mode 18:06:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xa00, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'\x86yz'}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$inet(r1, 0x0, 0x0) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_POST(r3, 0x8004500f, 0x713000) fsetxattr$security_selinux(r3, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x1) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e24, @multicast1}, 0x10) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x74c) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r2) 18:06:23 executing program 0: syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1801}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) msgget(0x2, 0x0) msgctl$MSG_STAT(0x0, 0xb, 0x0) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) r4 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x263, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) sendto$packet(r6, &(0x7f0000000340)="d6c80472fd1fb1781c24e43cdb5d887343fc46a9845de916ad6536e2d15823a639590d03eacd3c180a9e26768d76ae5c2a446872c2e7b76fb42a2ab85abaa790dbd4794641e0646630f504edd5e04dfba1", 0x51, 0x80, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000002c0)={0x0, 0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value, 0x8) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r7, 0x84, 0x20, &(0x7f0000000180), 0x4) r8 = getpgrp(0x0) setpriority(0x0, r8, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) connect$inet6(r5, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000100)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfff) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x400, 0x0) sendto$inet6(r3, 0x0, 0xfff3, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0xa) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) socket$inet6_sctp(0xa, 0x0, 0x84) 18:06:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xe00, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1426.628866] audit: type=1400 audit(1577124383.177:4113): avc: denied { associate } for pid=2497 comm="syz-executor.5" name="adsp1" dev="devtmpfs" ino=19037 scontext=system_u:object_r:policy_src_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 [ 1426.661090] device nr0 entered promiscuous mode 18:06:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0189436, &(0x7f0000000040)) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r3, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r3, r2, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) write$smack_current(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="76626f786e6574310049e7ab2ea503dbca04a1f5c03e27b88581e634d234199bde3481f8743a35815dc4b7b90fe84b102a995480c3d247f343ae74d99ca739f5f9475f"], 0x9) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$alg(0x26, 0x5, 0x0) r9 = accept4$alg(r8, 0x0, 0x0, 0x0) write$binfmt_elf64(r7, &(0x7f0000000240)=ANY=[@ANYPTR64], 0x8) splice(r6, 0x0, r9, 0x0, 0x20000000003, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:23 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(0x0, 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'\x86yz'}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$inet(r1, 0x0, 0x0) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_POST(r3, 0x8004500f, 0x713000) fsetxattr$security_selinux(r3, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x1) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e24, @multicast1}, 0x10) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x74c) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r2) [ 1427.317056] device nr0 entered promiscuous mode 18:06:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xf00, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:23 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00'}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1427.366854] audit: type=1804 audit(1577124383.917:4114): pid=2527 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/420/file0/file0" dev="loop2" ino=1739 res=1 18:06:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000200)={'\x86yz'}, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$inet(r1, 0x0, 0x0) ioctl$VFIO_SET_IOMMU(0xffffffffffffffff, 0x3b66, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2}, 0xd8) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_POST(r3, 0x8004500f, 0x713000) fsetxattr$security_selinux(r3, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:policy_src_t:s0\x00', 0x22, 0x1) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e24, @multicast1}, 0x10) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x74c) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r2) 18:06:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3e, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8010, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000100)=0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1004049, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno'}, 0x2c, {[{@posixacl='posixacl'}, {@fscache='fscache'}, {@nodevmap='nodevmap'}, {@nodevmap='nodevmap'}, {@privport='privport'}, {@uname={'uname', 0x3d, 'r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'}}, {@version_u='version=9p2000.u'}, {@noextend='noextend'}], [{@obj_type={'obj_type', 0x3d, '-securitymd5sumselfeth0Ovmnet0\\'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}, {@audit='audit'}, {@measure='measure'}, {@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x61, 0x31, 0x35, 0x0, 0x35, 0x65, 0x52], 0x2d, [0x63, 0x0, 0x33, 0x66], 0x2d, [0x62, 0x35, 0x36, 0x39], 0x2d, [0x34, 0x31, 0x38, 0x39], 0x2d, [0x64, 0x39, 0x62, 0x34, 0x51, 0x636e1ecc8ee6bac, 0x61, 0x34]}}}, {@subj_type={'subj_type', 0x3d, 'net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7'}}, {@euid_lt={'euid<', r3}}]}}) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1427.743537] 9pnet: Insufficient options for proto=fd 18:06:24 executing program 5: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x40c2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xcb, 0xfa00, {0x2, &(0x7f00000000c0), 0x2}}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0x80, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0xfffffffffffffa1f) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0x30f) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) fchownat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x100) rt_tgsigqueueinfo(r1, r0, 0x16, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000380)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(0x0, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f00000001c0)=0x8000) [ 1427.814061] device nr0 entered promiscuous mode 18:06:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x13f1, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1427.859706] audit: type=1804 audit(1577124384.407:4115): pid=2563 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/421/file0/file0" dev="loop2" ino=1740 res=1 [ 1427.861841] 9pnet: Insufficient options for proto=fd 18:06:24 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1427.960749] audit: type=1800 audit(1577124384.487:4116): pid=2575 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16658 res=0 [ 1428.044476] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 1428.238646] device nr0 entered promiscuous mode [ 1428.283355] minix_free_inode: bit 1 already cleared 18:06:26 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="efe5bf125822283a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ceph\x00', 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c00"/104], 0x68) 18:06:26 executing program 2: prctl$PR_SET_DUMPABLE(0x4, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r2) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x3f00, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:26 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00'}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:26 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:26 executing program 0: mkdir(&(0x7f0000000000)='./bus\x00', 0x10) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000000000400200) fstat(r0, 0x0) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r3) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r5 = add_key(&(0x7f0000000940)='user\x00', &(0x7f00000000c0)={'\xff\xff\xff', 0x1}, &(0x7f0000000040)="fc", 0x1, r4) keyctl$read(0xb, r5, &(0x7f0000005340)=""/4096, 0xd900) keyctl$chown(0x4, r5, 0x0, 0xee00) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) r6 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x713, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r7 = open(&(0x7f0000000000)='./bus\x00', 0x815eece484807c5d, 0xa4) ftruncate(r7, 0x10099b7) write$cgroup_type(r6, &(0x7f0000000100)='threaded\x00', 0x9) write$selinux_attr(r7, &(0x7f0000000080)='system_u:object_r:urandom_device_t:s0\x00', 0x26) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000200)={0x8, &(0x7f0000000240)=[{0x6e8, 0x4, 0x7, 0x7}, {0x8001, 0x80, 0x20, 0x4}, {0x4, 0xff, 0x4f, 0xd7a7}, {0x101, 0x3, 0x81, 0x5}, {0x1f, 0x4, 0x7f, 0x9}, {0x6, 0x1, 0x3, 0xbc}, {0x7fff, 0x7, 0x20, 0x7}, {0x8, 0x7, 0x9, 0x20000403}]}, 0x10) r8 = socket$inet(0x2, 0x0, 0x0) r9 = socket$inet(0x2, 0x0, 0x0) bind$inet(r9, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r10 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r10, 0x4c00, 0xffffffffffffffff) sendfile(r9, r10, 0x0, 0x0) r11 = dup2(r10, r1) bind$inet(r11, &(0x7f00000002c0)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r12 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r12, 0x4c00, 0xffffffffffffffff) sendfile(r8, r12, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r7, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "5fe405690e1fd5ea", "642280789911c31108003ec1052a3565", ']\"q\v', "b8a0547c099aa33e"}, 0x28) sendfile(r6, r7, 0x0, 0xfffffffd) connect$unix(r6, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 1429.696645] device nr0 entered promiscuous mode [ 1429.748217] device nr0 entered promiscuous mode 18:06:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x4000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1429.809937] libceph: resolve 'ïå¿X"(' (ret=-3): failed [ 1429.832734] libceph: parse_ips bad ip 'ïå¿X"(' [ 1429.847511] libceph: resolve 'ïå¿X"(' (ret=-3): failed [ 1429.872641] libceph: parse_ips bad ip 'ïå¿X"(' [ 1429.885295] audit: type=1804 audit(1577124386.437:4117): pid=2618 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/422/file0/file0" dev="loop2" ino=1741 res=1 18:06:26 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="efe5bf125822283a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ceph\x00', 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c00"/104], 0x68) [ 1430.072491] net_ratelimit: 16 callbacks suppressed [ 1430.072500] protocol 88fb is buggy, dev hsr_slave_0 [ 1430.082820] protocol 88fb is buggy, dev hsr_slave_1 [ 1430.087972] protocol 88fb is buggy, dev hsr_slave_0 [ 1430.093108] protocol 88fb is buggy, dev hsr_slave_1 18:06:26 executing program 0: accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000400)) fallocate(0xffffffffffffffff, 0x14, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000005c0)='/dev/ami\x152?\x1d\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x30) r3 = getpgrp(r2) perf_event_open(&(0x7f0000000380)={0xf1fb9131f8704894, 0x70, 0x81, 0xff, 0x80, 0x0, 0x0, 0x5, 0x2000, 0x16, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffffff8, 0x8, @perf_bp={&(0x7f0000000580), 0x4}, 0x0, 0x7d7d, 0x8, 0x7, 0x3, 0xf1, 0x3}, r3, 0xb, r1, 0x0) connect$tipc(r1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x40, 0x0) fchdir(r4) ftruncate(0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r5, &(0x7f0000001400)="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", 0x600) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000600)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x58}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r6, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='\x00\a\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00@', 0x0, 0x0) r7 = syz_open_dev$amidi(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r8 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r8, &(0x7f0000000640)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r8, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}, 0xfffffffffffffdf1) close(r8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x3) sendto$inet(r1, &(0x7f0000000440)="587d9f6cda5ba1325d57de2586405297f3b17f9e01db13a661998dd30f6b59b674d727c2399cbac4c8a7937a010a9acb8a5678afe0c6589b8c89a1e32107503ac2eb087e94ac4ec9f58eda86b974f1430e75ce96f654f834138993db84e4d9ebc94d813444995782b10c8f29ffe288cb7b2fd55de9135df437338e571ac432d2222b50f21046976e32928d0e1b67bb64ce596cdb73540501437996b00ac6522d7771b8b9284c5ad66e0a1de6b2f4fe94dea6cc28394380f2f79b41ddb380e0bf3e4958041e109164b969f6f6df076fcb84efc902050ffc8b138eb6f51f87d9b051ee7cf82908c27a3b01c5b9a8e43d143478d16f17935c", 0xf7, 0x95, &(0x7f0000000240)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x80184132, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x181) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000140)=0x3b, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 1430.251440] libceph: resolve 'ïå¿X"(' (ret=-3): failed [ 1430.293151] libceph: parse_ips bad ip 'ïå¿X"(' 18:06:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) r0 = shmget(0x0, 0x3000, 0xed6bf44be0d2f6e0, &(0x7f0000ffd000/0x3000)=nil) r1 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) r2 = msgget$private(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1-', 0x1ff) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r3, 0x0, 0x20004850) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'icmp\x00'}, &(0x7f0000000180)=0x1e) msgsnd(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x401, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000040)=""/148) shmat(r1, &(0x7f0000ffc000/0x2000)=nil, 0x7800) shmat(r1, &(0x7f0000ff8000/0x3000)=nil, 0x1000005001) shmctl$IPC_RMID(r0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000001c0)) bind$tipc(r4, 0x0, 0x0) 18:06:27 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgid() sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="efe5bf125822283a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='ceph\x00', 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c00"/104], 0x68) 18:06:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x6000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) fallocate(r1, 0x0, 0xc, 0x10001) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1430.571503] libceph: resolve 'ïå¿X"(' (ret=-3): failed [ 1430.583637] libceph: parse_ips bad ip 'ïå¿X"(' 18:06:27 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x57}], 0x2) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) r2 = syz_open_dev$amidi(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) flock(r2, 0x5) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1\x00') [ 1430.712521] protocol 88fb is buggy, dev hsr_slave_0 [ 1430.717646] protocol 88fb is buggy, dev hsr_slave_1 18:06:27 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200050d, 0x40000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f6151a972e5d8d0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000440)=0x1, 0xffe6) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='cpuset\x00') readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/245, 0xf5}], 0x1) prctl$PR_GET_NAME(0x10, &(0x7f00000019c0)=""/143) recvmsg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f0000000700)=""/165, 0xa5}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/34, 0x22}, {&(0x7f00000017c0)=""/98, 0x62}], 0x5, &(0x7f00000018c0)=""/137, 0x89}, 0x80) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000001980)={0x0, 0x254f, '\x00', 0x7}) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000001c0)=ANY=[@ANYBLOB="f1f2b3"], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000500)='cpuset\x00') ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r3, 0xc2604110, &(0x7f0000000480)={0x3, [[0xff, 0x5, 0x1ff, 0x88650, 0x1, 0x3, 0x0, 0x6], [0x5a, 0x3, 0x437, 0x7ff, 0x59, 0x8], [0x4, 0x6, 0x800, 0x9f5, 0x5, 0x3, 0x9, 0x6]], [], [{0xc0000, 0x7, 0x9}, {0x80000000, 0x1, 0x2}, {0x5, 0x2, 0xc9}, {0x8a1, 0xfff, 0x8}, {0xff, 0x5, 0x101}, {0x9, 0xa3, 0x2}, {0x40, 0x7, 0x80}, {0x8, 0x3, 0x2d}, {0xffff, 0x5, 0xff}, {0x0, 0x2, 0x7ff}, {0xe91d, 0x3, 0x726}, {0x9, 0x3, 0x1ff}], [], 0x5}) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_names\x00') preadv(r4, &(0x7f00000017c0), 0x3da, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) sendto$inet(r1, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) 18:06:27 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) r0 = shmget(0x0, 0x3000, 0xed6bf44be0d2f6e0, &(0x7f0000ffd000/0x3000)=nil) r1 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) r2 = msgget$private(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1-', 0x1ff) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r3, 0x0, 0x20004850) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'icmp\x00'}, &(0x7f0000000180)=0x1e) msgsnd(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x401, 0x0) msgctl$IPC_RMID(r2, 0x0) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000040)=""/148) shmat(r1, &(0x7f0000ffc000/0x2000)=nil, 0x7800) shmat(r1, &(0x7f0000ff8000/0x3000)=nil, 0x1000005001) shmctl$IPC_RMID(r0, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000001c0)) bind$tipc(r4, 0x0, 0x0) 18:06:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xf000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:27 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0x0, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1431.034326] audit: type=1804 audit(1577124387.587:4118): pid=2664 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/423/file0/file0" dev="loop2" ino=1742 res=1 18:06:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x9, 'syz0\x00', @bcast, 0x0, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @default, @null, @null]}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1431.198794] device nr0 entered promiscuous mode 18:06:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xf113, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:28 executing program 0: r0 = creat(&(0x7f0000001c00)='./bus\x00', 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) accept(0xffffffffffffffff, &(0x7f00000000c0)=@nfc, &(0x7f0000000040)=0x80) socket(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8048}, 0x0) r2 = dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x24e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x800fe) r4 = socket(0xa, 0x0, 0x8) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r4, 0x0, 0x20004850) accept4$ax25(r4, &(0x7f0000000240)={{0x3, @netrom}, [@rose, @bcast, @rose, @netrom, @netrom, @netrom, @bcast]}, &(0x7f0000000300)=0x48, 0x800) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000009c0)={0x0, @in={{0x2, 0x4e22, @remote}}, 0xfffd, 0x7}, &(0x7f0000000a80)=0x90) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x8104, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r7, 0x4008ae73, &(0x7f00000001c0)={0x1, 0x6}) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000ac0)={r6, 0x9}, 0x8) sendfile(r2, r3, 0x0, 0x800000000016) r8 = socket(0xa, 0x0, 0x8) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r8, 0x0, 0x20004850) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x400000) ioctl$SOUND_MIXER_READ_STEREODEVS(r9, 0x80044dfb, &(0x7f0000000000)) dup(r8) [ 1431.556327] audit: type=1804 audit(1577124388.097:4119): pid=2720 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir581988096/syzkaller.COhjJl/848/bus" dev="sda1" ino=17519 res=1 [ 1431.602580] protocol 88fb is buggy, dev hsr_slave_0 [ 1431.608726] protocol 88fb is buggy, dev hsr_slave_1 [ 1431.613903] protocol 88fb is buggy, dev hsr_slave_0 [ 1431.618994] protocol 88fb is buggy, dev hsr_slave_1 [ 1431.657128] device nr0 entered promiscuous mode 18:06:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x30000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1431.698141] audit: type=1804 audit(1577124388.247:4120): pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/424/file0/file0" dev="loop2" ino=1743 res=1 18:06:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x40) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) r2 = socket(0xa, 0x0, 0x8) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r2, 0x0, 0x20004850) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000000c0)={0xf000000, 0x83c, 0x31c, r2, 0x0, &(0x7f0000000080)={0x990afe, 0x751, [], @ptr=0x10000}}) getxattr(&(0x7f0000000200)='./file0\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="73657a00ffea31000000000000000000c89eef0cbdb81bc6b1f20337611659d9af2b97069562e7e7580f35a722b9104be8577992ffe1abfd35930ca78c69cf7f5f8ccaa650c5487d509ad7e74abb718f9240f4f16cb4fa4544efefde3583307fe6d7742912acb9d4bd22cc2940e8f28c9d28576a379e5d554ffaded649c72f6764e09a9d8722c70d5bc8a9ec4bfc87464653723ca0f0c6c97d626bcd756098ec91e0d2d16f06272809bf931ec658a668656fffef83de497255ebbf20ed32befa83adb13d6b54782ae76988cba3cb"], &(0x7f0000000280)=""/34, 0x22) write$P9_RLCREATE(r3, &(0x7f0000000100)={0x18, 0xf, 0x1, {{0x8, 0x3, 0x8}, 0x1}}, 0x18) [ 1431.810744] audit: type=1804 audit(1577124388.247:4121): pid=2733 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir581988096/syzkaller.COhjJl/848/bus" dev="sda1" ino=17519 res=1 18:06:28 executing program 0: mlockall(0x7) r0 = socket(0xa, 0x0, 0x8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r0, 0x0, 0x20004850) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000000)) munlockall() [ 1431.869879] audit: type=1400 audit(1577124388.417:4122): avc: denied { map } for pid=2685 comm="syz-executor.5" path="socket:[213866]" dev="sockfs" ino=213866 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tcp_socket permissive=1 18:06:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) r1 = dup(r0) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x4, 0x80000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) mkdirat$cgroup(r3, 0x0, 0x1ff) ioctl$MON_IOCQ_URB_LEN(r3, 0x9201) r4 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e21, @rand_addr=0x1}}, 0x0, 0x0, 0xb, 0x0, "7694cd799a7dcaf31096f0ac58d04e947abebf7cc507d0df90feb5851da02e56a2cd88011743a79d633462dd4c27211daad15f782e3094e1fd2883ebf4ee9df173d6a67d5730bc97a3b88fe9ce866136"}, 0xd8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = dup3(r1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x6, &(0x7f0000000100)=@framed={{}, [@map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x9}, @exit]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x125, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 18:06:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x34000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1432.257350] audit: type=1804 audit(1577124388.807:4123): pid=2751 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/425/file0/file0" dev="loop2" ino=1744 res=1 18:06:28 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:28 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0x0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYRES32=r2, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0102000800050001000000"], 0x3}}, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400000) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r6, 0xffffffffffffffff) ioctl$VIDIOC_QUERYBUF(r5, 0xc0585609, &(0x7f0000000080)={0x0, 0x9, 0x4, 0x108e807, 0x2039, {}, {0x2, 0x2, 0x7f, 0x4, 0x0, 0x39, "47a1b839"}, 0x275, 0x7, @fd, 0x200, 0x0, r6}) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r7, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r8, 0x200, 0x70bd28, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}}, 0x4000000) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r10}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) sendmsg$nl_route(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@ipv6_newaddr={0x34, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r10}, [@IFA_FLAGS={0x8, 0x9, 0x3778bcbaae6b531f}, @IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x34}}, 0x0) 18:06:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x400300, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) write$P9_RLERRORu(r2, &(0x7f0000000240)={0x12, 0x7, 0x2, {{0x5, 'vfat\x00'}, 0x1}}, 0x12) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) clone(0x200, &(0x7f0000000080)="de7089713c651dda85db3550b043b799ab5ce7c780c53258e7e5743bfc00fd8d133266928755663308ba2fb47cd571419032f6718046ff7b2432159c529d0d88e660cee32b7a74b0ddc20f5b7611fddb6656e51761154763a95ab7ef6ffcbdc5933ac0a2146fb373210976afeb8f1507beb0994d940f9ccf8606f2f4d3187c3b0cb6a193e627202dee2603366dea", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000006c0)="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") setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) fcntl$getown(r0, 0x9) r3 = getpgid(0x0) syz_open_procfs(r3, &(0x7f0000000300)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) r4 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f00000003c0), &(0x7f00000004c0)=0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) r5 = socket(0xa, 0x0, 0x8) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r5, 0x0, 0x20004850) bind$bt_sco(r5, &(0x7f0000000280)={0x1f, {0x0, 0x7, 0x3, 0x20, 0xff, 0x40}}, 0x8) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1432.454566] device nr0 entered promiscuous mode [ 1432.527006] device nr0 entered promiscuous mode 18:06:29 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) r1 = socket(0xa, 0x0, 0x8) socket(0x2, 0x5, 0x20) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r1, 0x0, 0x10) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000040)) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="24000000ff0007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000070a43ba5d806055b6fdd80b40000000140001000029ec2402020cd37e9945a95e000000", 0x4c}], 0x1}, 0x0) 18:06:29 executing program 0: r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) r2 = syz_open_dev$amidi(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) fcntl$getownex(r2, 0x10, &(0x7f0000000100)) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r0, r1, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r3}, 0x30) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f00000002c0)={0xd, 0x8, 0x23ac}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) rt_sigprocmask(0x0, &(0x7f0000000000)={0x7ffffffd}, 0x0, 0x8) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) r6 = socket(0xa, 0x0, 0x8) sendmsg$key(r6, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r6, 0x0, 0x20004850) sendmsg$TIPC_NL_LINK_SET(r6, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40100202}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="240100004b648d8a0d11c19709a939baaa4b21217b053e412d288c67876ef9ebf546b3870b5f8440bb405ad54fd407cf054e4cfa24a0ba57b8d6901f6d2d428072101ff8111ad2969c2636089a7ee1755b8a7515e0ec0bd63be95fa669e075df5942e52925858b5aedc4804ad5e1fa35fc2ad3199edbcd61bf1867067c9352e279330e396a9b89c6938f3b397b82cec37d18f4e46d47195d5b", @ANYRES16=0x0, @ANYBLOB="000326bd7000fedbdf25090000001001010038000400200001000a004e2100000008fe8000000000000000000000000000aa810000001400020002004e24e00000010000000000000000100001007564703a73797a32000000002c0004001400010002004e20e000000200000000000000001400020002004e21e000000100000000000000002c0004001400010002004e22e000000100000000000000001400020002004e23ac1414aa00000000000000001000010069623a767863616e31000000080003000000000044000200080004000300000008000400000100000800030005000000080004000400000008000200030000000800030005000000080001000c00000008000200ff0f0000100001007564703a73797a3000000000"], 0x124}, 0x1, 0x0, 0x0, 0x8001}, 0x40400e0) splice(r4, 0x0, r5, 0x0, 0x200, 0x0) 18:06:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xf0ffff, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:29 executing program 0: getpid() getpgid(0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) r0 = socket(0xa, 0x0, 0x8) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r0, 0x0, 0x20004850) ppoll(&(0x7f0000000200)=[{r0, 0x4000}], 0x1, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) socket$kcm(0x11, 0xa, 0x300) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)) socket(0xa, 0x3, 0x8) syz_open_dev$amidi(0x0, 0x0, 0x0) gettid() waitid(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x9a0efa2b65aacb27) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) r1 = gettid() r2 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) ioctl$SG_GET_REQUEST_TABLE(r2, 0x227d, &(0x7f0000000780)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240), 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0xc) open(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r3, r4, 0x0, 0x102000004) 18:06:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x1000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:29 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1500, 0x0, 0x2, 0x0, 0x8000000000000000}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8,\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) [ 1432.997536] audit: type=1804 audit(1577124389.547:4124): pid=2802 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/426/file0/file0" dev="loop2" ino=1745 res=1 18:06:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x2000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:30 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) fchdir(r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000bc0)={0x0}, &(0x7f0000000c00)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8000) sendmsg$key(r3, 0x0, 0x20004850) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x0) mkdirat$cgroup(r8, 0x0, 0x1ff) ioctl$DRM_IOCTL_RES_CTX(r8, 0xc0106426, &(0x7f0000000500)={0x5, &(0x7f00000004c0)=[{}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000580)={r9}) r10 = socket$inet(0x2, 0x0, 0x0) bind$inet(r10, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r11 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r11, 0x4c00, 0xffffffffffffffff) sendfile(r10, r11, 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000180)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000240)="e79c3e046624c8ed0b4bfdf2ca1abdc69d", 0x11, 0x7}, {&(0x7f0000000300)="ddad4b8c3a23fdede466a462ea5cb69c567d69a1dc4afdaee66549789719bf7d94fa700db749d678b6386e66b267279cd91af146ca229cc2f8e32644eb78caca25e9704e9ec05fade91a43d659bd5b8b7396e0eb2d539c871a84bef0a88b96c3419317904ac58102d1487659", 0x6c, 0x7f}, {&(0x7f00000006c0)="342e51d66579435f640015c12d4a33d7697c3ab0def1ec3b3d4daee8f955ddc376b0839bfd5ff90e03e463534b7a763e07267466ae2d15671648ea14824b5d6ae67762dc4b4eb185ab9809bc5fab0e0e025b8775a4ecfc3db3261e521522af1d0655d655a1bdff98958cd3978fc533dc043b19d80228a6ff7f52aff39d1ac856fc8d62e4eb48397b81f914637b18c941cfe3c6c5053e41df4a3fc1ae2d5bb335c5f7b6ce5316588997dc2cfc0665561273fe21a154f71ce9068c4d2a9a97a5a5e0ad6023efb1f64faf9cfd7a03a6c05d7af230b344068d825e856d174166602b4c9836bba61d", 0xe6, 0x80000000}], 0x10000, &(0x7f0000000940)=ANY=[@ANYBLOB="6e6f7573800b0000617474722c010000000100000079722c61636c2c6661756c745f696e6a656374696f6e3d30783020303030303030303030303030304c2ce5ea98bfaf5bc9e0d6d57ae573ee6e6f61636c2c757365725f78617474722c61636c2c6e6f757365725f78617474722c7569643d12dd9b09cc4a3810aac1971b53edc1a8708a03402be1a90006d434c264529a83218716618cbf7bf9eeea8c5251758fac3a2e09e55ecb4d1040917eccd6d04c0918f117f9908751e275efeafa4f03739ba00ae7f3536161eff827f06cc17862d03f26d618825a53922c6dfdb0b0765d3a0faf6cc216e137f87e8b9d38ba34", @ANYRESOCT=r11, @ANYBLOB="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"]) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f00000008c0)={{}, [@rose, @rose, @default, @default, @null, @default, @rose, @default]}, &(0x7f0000000100)=0x48) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:30 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0x0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x3000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1433.969644] device nr0 entered promiscuous mode 18:06:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x4000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1434.114792] device nr0 entered promiscuous mode 18:06:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xa000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfa8, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0xffff}, 0x16, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x6000, 0x0) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, 0x11, r2, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r3, 0x0, 0x20004850) close(r3) 18:06:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xe000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:31 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0189436, &(0x7f0000000040)) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r1, r2, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r1, r0, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) open_by_handle_at(r4, &(0x7f00000003c0)={0x9, 0x1, "03"}, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'}) 18:06:31 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) getpgid(r0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x2f, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @dev, {[@rr={0x7, 0xb, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local]}]}}}}}}}, 0x0) 18:06:31 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x82000, 0x0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f00000001c0)=0x1aee) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, &(0x7f00000001c0)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e23, 0x1, @mcast1}, {0xa, 0x4e23, 0xfffffe01, @mcast1, 0x74a}, 0x800, [0x100, 0x6, 0x3, 0x6, 0x1, 0x0, 0x5, 0x7ff]}, 0x5c) dup2(r3, r1) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r5, 0x4004560e, &(0x7f00000001c0)=0x1aee) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x78, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x58, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4c, 0x2, [@IFLA_VTI_REMOTE={0x8, 0x5, @multicast1}, @IFLA_VTI_LOCAL={0x8, 0x4, @empty}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x29}}, @IFLA_VTI_LOCAL={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0xb}}, @IFLA_VTI_LOCAL={0x8, 0x4, @multicast1}, @IFLA_VTI_REMOTE={0x8, 0x5, @loopback}]}}}]}, 0x78}}, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000300)={&(0x7f0000000040)={0x1d, r8}, 0x10, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\b\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300002001000000040000a0400200003d2bbc73ec216b790ffaa68de758599d40db88f8a552f7b5696675d9e65650bf933a5787d11153ed32c314b0f2b567c905aa5a531b6db2ee82793da573aef040d652e2dd1211"], 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000b44000/0x2000)=nil}) r9 = socket$inet(0xa, 0x801, 0x84) connect$inet(r9, &(0x7f0000000200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMP(r9, 0x8906, 0x0) listen(r9, 0x7b) 18:06:31 executing program 5: pipe(0x0) capget(0x0, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6}, 0x0, 0xffffffffefffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfef0) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r1) fsetxattr$system_posix_acl(r0, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000120eb8000000000020001521258875cbda715878f2db44518ce66c1e5f3c9f497f38ab290ea01cb467208431861defbfd7d286764b0c5c7325f23d34edf67db2740ab283af8ac9a40d301c09d864e9f57db1cba5b2c435d95b1ba987bc42027e66e5e9a580a2d07db8c26e17d4e6d7876ea043640c8e1993200000000000000004000"/148, @ANYRES32, @ANYRES64=r1, @ANYRESHEX], 0x4, 0x1) socket(0xa, 0x3, 0x8) r2 = syz_open_dev$amidi(0x0, 0x9c4, 0x70000) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) ftruncate(0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000380)={0x1}, 0x6) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r4 = gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000280)={[], 0x3, 0x18000, 0xffffffff, 0x100000000, 0x1, r4}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x40) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) r7 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) sendfile(r5, r6, 0x0, 0x102000004) 18:06:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xf000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:32 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0x0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:32 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1435.477681] audit: type=1804 audit(1577124392.027:4125): pid=2928 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/428/file0/file0" dev="sda1" ino=17535 res=1 18:06:32 executing program 5: socket$kcm(0xa, 0x3, 0x73) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='\xa8\x00\x1e\x00', 0x103600, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='\x1admv/net/tu\x05\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r3, 0x28, &(0x7f0000000040)}, 0xffffffffffffffdf) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000002c0)=0xffffffe1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="004386dd20"], 0xfdef) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) chroot(&(0x7f0000000380)='./file0\x00') write$binfmt_script(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="01"], 0x1) close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x1) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x4000) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x49}, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) [ 1435.657873] device nr0 entered promiscuous mode 18:06:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0189436, &(0x7f0000000040)) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x16) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x8}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x800}, &(0x7f0000000580)=0x3f, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r3, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r3, r2, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000080)) r6 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r6, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) ioprio_get$pid(0x0, r6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1435.679677] device nr0 entered promiscuous mode 18:06:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x3f000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1435.753560] net_ratelimit: 18 callbacks suppressed [ 1435.753569] protocol 88fb is buggy, dev hsr_slave_0 [ 1435.763785] protocol 88fb is buggy, dev hsr_slave_1 [ 1435.768939] protocol 88fb is buggy, dev hsr_slave_0 [ 1435.774066] protocol 88fb is buggy, dev hsr_slave_1 [ 1435.779235] protocol 88fb is buggy, dev hsr_slave_0 [ 1435.784377] protocol 88fb is buggy, dev hsr_slave_1 18:06:32 executing program 5: socket$kcm(0xa, 0x3, 0x73) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x200000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='\xa8\x00\x1e\x00', 0x103600, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='\x1admv/net/tu\x05\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r3, 0x28, &(0x7f0000000040)}, 0xffffffffffffffdf) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000002c0)=0xffffffe1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="004386dd20"], 0xfdef) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) chroot(&(0x7f0000000380)='./file0\x00') write$binfmt_script(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB="01"], 0x1) close(r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x1) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x4000) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000003c0)={0x0, 0x49}, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) 18:06:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x40000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1436.123300] audit: type=1804 audit(1577124392.677:4126): pid=3006 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/429/file0/file0" dev="loop2" ino=1746 res=1 18:06:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r0, 0x28, &(0x7f0000000040)}, 0xffffffffffffffdf) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000080)={0xa, {0x9, 0x4, 0x1}}, 0xa) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x60000000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1436.313323] protocol 88fb is buggy, dev hsr_slave_0 [ 1436.318922] protocol 88fb is buggy, dev hsr_slave_1 [ 1436.325052] protocol 88fb is buggy, dev hsr_slave_0 [ 1436.330541] protocol 88fb is buggy, dev hsr_slave_1 [ 1437.089172] audit: type=1804 audit(1577124393.637:4127): pid=3059 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/430/file0/file0" dev="loop2" ino=1747 res=1 [ 1439.051433] IPVS: ftp: loaded support on port[0] = 21 [ 1439.118513] chnl_net:caif_netlink_parms(): no params data found [ 1439.148489] bridge0: port 1(bridge_slave_0) entered blocking state [ 1439.155181] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.162255] device bridge_slave_0 entered promiscuous mode [ 1439.169534] bridge0: port 2(bridge_slave_1) entered blocking state [ 1439.176067] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.183637] device bridge_slave_1 entered promiscuous mode [ 1439.199903] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1439.209748] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1439.230961] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1439.239500] team0: Port device team_slave_0 added [ 1439.245390] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1439.255942] team0: Port device team_slave_1 added [ 1439.261472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1439.269223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1439.354594] device hsr_slave_0 entered promiscuous mode [ 1439.392835] device hsr_slave_1 entered promiscuous mode [ 1439.433253] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1439.440532] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1439.454698] bridge0: port 2(bridge_slave_1) entered blocking state [ 1439.461055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1439.467737] bridge0: port 1(bridge_slave_0) entered blocking state [ 1439.474117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1439.512922] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1439.519340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1439.529303] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1439.538447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1439.546350] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.563934] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.571041] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1439.581673] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1439.588737] 8021q: adding VLAN 0 to HW filter on device team0 [ 1439.598726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1439.608133] bridge0: port 1(bridge_slave_0) entered blocking state [ 1439.614562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1439.625405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1439.633359] bridge0: port 2(bridge_slave_1) entered blocking state [ 1439.639719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1439.656327] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1439.664415] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1439.674871] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1439.692103] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1439.703363] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1439.713961] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1439.721022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1439.729296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1439.737331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1439.754227] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 1439.762037] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1439.769323] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1439.785726] 8021q: adding VLAN 0 to HW filter on device batadv0 18:06:36 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x82000, 0x0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f00000001c0)=0x1aee) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, &(0x7f00000001c0)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e23, 0x1, @mcast1}, {0xa, 0x4e23, 0xfffffe01, @mcast1, 0x74a}, 0x800, [0x100, 0x6, 0x3, 0x6, 0x1, 0x0, 0x5, 0x7ff]}, 0x5c) dup2(r3, r1) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r5, 0x4004560e, &(0x7f00000001c0)=0x1aee) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x78, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x58, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4c, 0x2, [@IFLA_VTI_REMOTE={0x8, 0x5, @multicast1}, @IFLA_VTI_LOCAL={0x8, 0x4, @empty}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x29}}, @IFLA_VTI_LOCAL={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0xb}}, @IFLA_VTI_LOCAL={0x8, 0x4, @multicast1}, @IFLA_VTI_REMOTE={0x8, 0x5, @loopback}]}}}]}, 0x78}}, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000300)={&(0x7f0000000040)={0x1d, r8}, 0x10, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\b\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300002001000000040000a0400200003d2bbc73ec216b790ffaa68de758599d40db88f8a552f7b5696675d9e65650bf933a5787d11153ed32c314b0f2b567c905aa5a531b6db2ee82793da573aef040d652e2dd1211"], 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000b44000/0x2000)=nil}) r9 = socket$inet(0xa, 0x801, 0x84) connect$inet(r9, &(0x7f0000000200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMP(r9, 0x8906, 0x0) listen(r9, 0x7b) 18:06:36 executing program 5: unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000001c0)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000240), 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8946, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='ave_1ut\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) writev(0xffffffffffffffff, &(0x7f0000000b40), 0x0) sched_yield() r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000001000)='keyring\x00', 0x0, 0x0, 0x0, r2) add_key(&(0x7f0000000480)='id_\x00\x00\x00\x00\xff\xff\xff\xff\xe1\xbesm\x9a7\xcf\x1fHp\x86#\xc5Rk\xce\x9c\x1d\xa1\xb4f\xe9\x8d\xfcJ\x1ay\x92&\xd5\xdaq\x8f\xf6\xd9Z\xf2-;\x13I\x99B\x05\x16\xe3\x84\xdb!\xd6\xebaU\x02#P\xb8\x02\x8c\xc0~%\xeb\x12\xd2\xd7\x03\xd4\xdf\xcc\x9fm\xd8\xbe7&\xfa\x10\xbf\xd2\xec\x1f/\x82\';\xc4\"\x82\xf1\xf6\xa9\xa9\xf9\x81i\xfd\xc4\xd1\x87\xbb\x11\xcf\xb00H0o\x94K\x9b\xa5\x90\xa6\x89\x17y\x9e\xa9\xc0\xf3lV\x01\x97\ai G\x98p\xf8\xd4v\xbcH\xcf\xc0\xd6\xb8\xd6\xc1f\v\xae\xb9\x9f_\x97\x1a\xd3\\,\xb0m\xce\x9f\xed', 0x0, &(0x7f00000003c0)="652ee3d766912bfc061e4bdb2049b2db1063db609cce969095c0fda8b6d1305a2201c63dda3d4d86999809f1da3f71766ee109f9882e6c7bb780c965df390a2e8ecc83ed6db6fe74f38353104f158d15f1d2fffb0ae19bc7ce6589f601ab401a542dce2df8f8fc4d9312f1ee1d981170e7c499619baec1ca3c082c692a6a056daceccf1838788be77337f26c371729efb9c518159f7668d2264b", 0x9a, r1) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r5 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf1\x0e\x00\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000040)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_MOVE(0x1e, r5, r4, r5, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000006c0)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf1\x0e\x00\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,\xba\xfd\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3\xfe_8', &(0x7f0000000300)=@keyring={'\x00\x00\x00\x00\x00\x00\x00\x02\x00', r4}) keyctl$clear(0x7, r3) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x0) mkdirat$cgroup(r7, 0x0, 0x1ff) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x400000) ioctl$KDGETMODE(r8, 0x4b3b, &(0x7f0000000380)) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) r9 = syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r9, 0xc0106401, &(0x7f00000002c0)={0x1000, &(0x7f0000001040)=""/4096}) 18:06:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x9effffff, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:36 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(0xffffffffffffffff, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:36 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) sendfile(r2, r3, 0x0, 0x0) fallocate(r3, 0x2, 0xfffffffffffffff9, 0x3) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1440.005329] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1440.035172] device nr0 entered promiscuous mode [ 1440.069292] device nr0 entered promiscuous mode 18:06:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xf0ffffff, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1440.158566] bond0: Error: Device is in use and cannot be enslaved [ 1440.172843] audit: type=1804 audit(1577124396.727:4128): pid=3096 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/431/file0/file0" dev="loop2" ino=1748 res=1 18:06:36 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x82000, 0x0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f00000001c0)=0x1aee) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, &(0x7f00000001c0)=0x80) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e23, 0x1, @mcast1}, {0xa, 0x4e23, 0xfffffe01, @mcast1, 0x74a}, 0x800, [0x100, 0x6, 0x3, 0x6, 0x1, 0x0, 0x5, 0x7ff]}, 0x5c) dup2(r3, r1) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r5, 0x4004560e, &(0x7f00000001c0)=0x1aee) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x78, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x58, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4c, 0x2, [@IFLA_VTI_REMOTE={0x8, 0x5, @multicast1}, @IFLA_VTI_LOCAL={0x8, 0x4, @empty}, @IFLA_VTI_REMOTE={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x29}}, @IFLA_VTI_LOCAL={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0xb}}, @IFLA_VTI_LOCAL={0x8, 0x4, @multicast1}, @IFLA_VTI_REMOTE={0x8, 0x5, @loopback}]}}}]}, 0x78}}, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000300)={&(0x7f0000000040)={0x1d, r8}, 0x10, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\b\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="0300002001000000040000a0400200003d2bbc73ec216b790ffaa68de758599d40db88f8a552f7b5696675d9e65650bf933a5787d11153ed32c314b0f2b567c905aa5a531b6db2ee82793da573aef040d652e2dd1211"], 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000b44000/0x2000)=nil}) r9 = socket$inet(0xa, 0x801, 0x84) connect$inet(r9, &(0x7f0000000200)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SIOCGSTAMP(r9, 0x8906, 0x0) listen(r9, 0x7b) 18:06:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x7, 0x68c02) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:37 executing program 0: prctl$PR_SET_SECUREBITS(0x1c, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getrlimit(0x7, &(0x7f0000000100)) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xfffffffffffffffe, 0x0, {0xfffffffffffffffe}}, 0x18) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r4, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x55, 0x0, 0x0, 0x2006, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x4, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x3770e7807ecf1b12) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) r6 = socket(0x2, 0x803, 0xff) r7 = socket$inet(0x2b, 0x1, 0xd0) bind$inet(r7, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r7) connect$inet(r7, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) sendfile(r6, r5, 0x0, 0x72439a6b) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc0189436, &(0x7f0000000040)) r9 = getpid() r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0xa, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000000540)={0x2, 0x9, 0x100008, 0x64}, &(0x7f00000003c0)=0x100000000c39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0xf9}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r9, r10, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r9, r8, 0x0, 0xa, &(0x7f0000000240)='&vboxnet0\x00'}, 0x30) ioctl$TIOCL_GETKMSGREDIRECT(r8, 0x541c, &(0x7f0000000180)) ioctl$KVM_GET_REGS(r5, 0x8090ae81, 0x0) 18:06:37 executing program 5: r0 = socket(0x2, 0x80805, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/14, 0xe}, {&(0x7f00000000c0)=""/164, 0xa4}], 0x2, &(0x7f0000000180)=""/149, 0x95}, 0x40) sendmmsg$inet_sctp(r0, &(0x7f0000003e00)=[{&(0x7f0000000280)=@in={0x2, 0x0, @dev}, 0x10, &(0x7f00000025c0)=[{&(0x7f00000004c0)="f5"}], 0x1, &(0x7f0000002700)=[@sndinfo={0x20}, @init={0x18, 0x84, 0x5}], 0x38}], 0x1, 0x0) [ 1441.112533] net_ratelimit: 6 callbacks suppressed [ 1441.112542] protocol 88fb is buggy, dev hsr_slave_0 [ 1441.122723] protocol 88fb is buggy, dev hsr_slave_1 18:06:37 executing program 5: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f00000008c0)=""/218, 0xda}, {0x0}], 0x2}}], 0x1, 0x0, &(0x7f0000005480)) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 18:06:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xf1130000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:38 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) mkdir(&(0x7f0000001340)='./file0\x00', 0x4) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') 18:06:38 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(0xffffffffffffffff, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1441.469313] audit: type=1804 audit(1577124398.017:4129): pid=3154 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/432/file0/file0" dev="loop2" ino=1749 res=1 18:06:38 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xfffff000, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r1, r2, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r3}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r3}, 0xc) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r4, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1441.641117] device nr0 entered promiscuous mode 18:06:38 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x9, 0x12) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x2}, [@ldst={0x0, 0x0, 0x2}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r0}, 0x78) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0xa80ba79628b7d39f, 0x0) 18:06:38 executing program 5: setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0xff}, 0x4810, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000001c0)={0x3, 0x7fff, 0x8, 0x1, 0x1b, "b04e1e27415d23ccb9ec8c4bd7ff8a3892ef7e"}) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000280)) getpeername(r3, &(0x7f0000000100)=@can, &(0x7f0000000180)=0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) read$FUSE(r1, &(0x7f0000000380), 0x313) r4 = socket(0xa, 0x0, 0x8) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r4, 0x0, 0x20004850) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x22400, 0x0) bind$netrom(r5, 0x0, 0x210) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, 0x0, 0x0) [ 1441.992538] protocol 88fb is buggy, dev hsr_slave_0 [ 1441.998182] protocol 88fb is buggy, dev hsr_slave_1 [ 1442.003376] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.008464] protocol 88fb is buggy, dev hsr_slave_1 [ 1442.013630] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.018726] protocol 88fb is buggy, dev hsr_slave_1 [ 1442.181582] device nr0 entered promiscuous mode 18:06:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xffffff7f, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1442.228008] audit: type=1804 audit(1577124398.777:4130): pid=3193 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/433/file0/file0" dev="loop2" ino=1750 res=1 [ 1442.262542] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.267744] protocol 88fb is buggy, dev hsr_slave_1 18:06:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xffffff9e, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1442.472351] device nr0 entered promiscuous mode 18:06:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = socket(0xa, 0x0, 0x8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r1, 0x0, 0x20004850) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f00000001c0)=@ng={0x4, 0x0, "b0cd97303b1a3e1722ce33273b8046031d71"}, 0x14, 0x3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:39 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(0xffffffffffffffff, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:39 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1442.568023] device nr0 entered promiscuous mode 18:06:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xfffffff0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:39 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x43, 0x0, &(0x7f0000000000)) bind$packet(0xffffffffffffffff, 0x0, 0x0) 18:06:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x43, 0x0, &(0x7f0000000000)) bind$packet(0xffffffffffffffff, 0x0, 0x0) 18:06:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x1, 0xffffffff, [{0x0, 0x2}]}, @enum={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f00000002c0)=""/236, 0x3e, 0xec, 0x8}, 0x20) [ 1443.132217] device nr0 entered promiscuous mode [ 1443.353332] device nr0 entered promiscuous mode 18:06:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0xffffffff, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:40 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x0) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1443.378527] audit: type=1804 audit(1577124399.927:4131): pid=3245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/434/file0/file0" dev="loop2" ino=1751 res=1 18:06:40 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000f4dff4), 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=@migrate={0x188, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, [@migrate={0x138, 0x11, [{@in=@multicast2, @in6=@loopback, @in, @in, 0x0, 0x3507, 0x2, 0xa}, {@in=@broadcast, @in=@loopback, @in, @in, 0x0, 0x3500, 0xa, 0xa}, {@in6=@mcast2, @in6=@empty, @in, @in, 0x0, 0x3503, 0xa, 0xa}, {@in=@loopback, @in=@remote, @in, @in, 0x0, 0x3507, 0x7, 0x2}, {@in=@rand_addr=0x2, @in=@dev={0xac, 0x14, 0x14, 0x1d}, @in, @in, 0x0, 0x0, 0x2, 0xa}, {@in=@empty, @in=@multicast2, @in, @in, 0x0, 0x3505, 0xa, 0x2}, {@in=@empty, @in=@dev={0xac, 0x14, 0x14, 0x21}, @in, @in, 0x0, 0x3505, 0x0, 0x2}]}]}, 0x188}}, 0x40000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) dup3(r0, r1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000000)=0x80) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={@remote, @loopback, @local, 0x0, 0x6, 0x0, 0x480, 0x1, 0x480008, r3}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x66}}, &(0x7f0000003ff6)='G\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffffc) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x26140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000140)=0x401, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) 18:06:40 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:40 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x6, 0x1, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x0, 0xc41) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f00000000c0)) syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:40 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1443.605236] device nr0 entered promiscuous mode [ 1443.629517] device nr0 entered promiscuous mode [ 1443.739578] FAT-fs (loop2): bogus number of reserved sectors [ 1443.763682] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1443.866419] print_req_error: I/O error, dev loop11, sector 64 [ 1443.880114] print_req_error: I/O error, dev loop11, sector 256 [ 1443.886992] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1443.907109] print_req_error: I/O error, dev loop11, sector 512 [ 1443.913831] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1443.953477] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1443.998129] UDF-fs: Scanning with blocksize 512 failed [ 1444.017027] print_req_error: I/O error, dev loop11, sector 64 [ 1444.025471] print_req_error: I/O error, dev loop11, sector 512 [ 1444.031830] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1444.083716] print_req_error: I/O error, dev loop11, sector 1024 [ 1444.091370] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1444.132132] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1444.163361] UDF-fs: Scanning with blocksize 1024 failed [ 1444.191040] print_req_error: I/O error, dev loop11, sector 64 [ 1444.200699] print_req_error: I/O error, dev loop11, sector 1024 [ 1444.207256] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1444.239850] print_req_error: I/O error, dev loop11, sector 2048 [ 1444.250699] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1444.268049] device nr0 entered promiscuous mode 18:06:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x2, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1444.318895] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1444.356084] UDF-fs: Scanning with blocksize 2048 failed [ 1444.363930] FAT-fs (loop2): bogus number of reserved sectors [ 1444.378702] print_req_error: I/O error, dev loop11, sector 64 [ 1444.387825] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1444.397304] FAT-fs (loop2): Can't find a valid FAT filesystem [ 1444.406228] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 18:06:40 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x0) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1444.426063] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1444.444067] UDF-fs: Scanning with blocksize 4096 failed 18:06:41 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000042ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000200)) [ 1444.452316] audit: type=1804 audit(1577124400.997:4132): pid=3314 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/435/file0/file0" dev="sda1" ino=17524 res=1 [ 1444.482645] UDF-fs: warning (device loop11): udf_fill_super: No partition found (1) [ 1444.535319] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1444.547468] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1444.562661] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1444.576171] UDF-fs: Scanning with blocksize 512 failed 18:06:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x17, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x54}}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1444.585189] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1444.617450] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1444.634596] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1444.649343] UDF-fs: Scanning with blocksize 1024 failed [ 1444.663004] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1444.672636] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 18:06:41 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$unix(0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) mount(&(0x7f00000001c0)=@nullb='/dev/nullb0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='ntfs\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) 18:06:41 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000f4dff4), 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=@migrate={0x188, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, [@migrate={0x138, 0x11, [{@in=@multicast2, @in6=@loopback, @in, @in, 0x0, 0x3507, 0x2, 0xa}, {@in=@broadcast, @in=@loopback, @in, @in, 0x0, 0x3500, 0xa, 0xa}, {@in6=@mcast2, @in6=@empty, @in, @in, 0x0, 0x3503, 0xa, 0xa}, {@in=@loopback, @in=@remote, @in, @in, 0x0, 0x3507, 0x7, 0x2}, {@in=@rand_addr=0x2, @in=@dev={0xac, 0x14, 0x14, 0x1d}, @in, @in, 0x0, 0x0, 0x2, 0xa}, {@in=@empty, @in=@multicast2, @in, @in, 0x0, 0x3505, 0xa, 0x2}, {@in=@empty, @in=@dev={0xac, 0x14, 0x14, 0x21}, @in, @in, 0x0, 0x3505, 0x0, 0x2}]}]}, 0x188}}, 0x40000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) dup3(r0, r1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000000)=0x80) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={@remote, @loopback, @local, 0x0, 0x6, 0x0, 0x480, 0x1, 0x480008, r3}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x66}}, &(0x7f0000003ff6)='G\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffffc) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x26140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000140)=0x401, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1444.681937] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1444.689764] UDF-fs: Scanning with blocksize 2048 failed [ 1444.696030] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1444.705522] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1444.714808] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1444.722090] UDF-fs: Scanning with blocksize 4096 failed [ 1444.728074] UDF-fs: warning (device loop11): udf_fill_super: No partition found (1) [ 1444.819416] ntfs: (device nullb0): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1444.852289] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1444.867223] ntfs: (device nullb0): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 1444.881273] ntfs: (device nullb0): ntfs_fill_super(): Not an NTFS volume. [ 1444.910645] ntfs: (device nullb0): is_boot_sector_ntfs(): Invalid boot sector checksum. [ 1444.928518] ntfs: (device nullb0): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 1444.942743] device nr0 entered promiscuous mode 18:06:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(0xffffffffffffffff, &(0x7f0000000500)={0x5, 0x10, 0xfa00, {&(0x7f00000006c0), r3}}, 0x18) socket$netlink(0x10, 0x3, 0x17) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) r5 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r5) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r4, 0x80184153, &(0x7f0000000240)={0x0, &(0x7f00000001c0)=[&(0x7f0000000180)="3717525c90b68234635dea4f75f3a0e2500b0075b960102b", &(0x7f0000000300)="da2afe3675e02af97059c7209be7e059170b45ab073d6657328425a2f562d58bea6a5db713705a99f7406a9951b2bac6df7ff75e068f49cd35abd2bab5295d5158c835394076f04f9e9b4e5b3e6cfdbef9095e44935a3814b137458c749a40c3c7c55aefb6d9dc7d98c749ffc33d046cd8ef214082e45b275364b30c0fc4d1adf8c790c341a51eb45e736375fd31d04cdceb29def469283ea981bb8c81b90a0b152936fc93291585b2772b054410411a91cd89f6ae76f30e7c3a6bfc52d54294f979c4ef4821eb14d5706adca777f589e19f0c063d92cce9ba345a"]}) getsockname(r5, &(0x7f0000000080)=@nfc, &(0x7f0000000100)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1444.960270] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 18:06:41 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000f4dff4), 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=@migrate={0x188, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, [@migrate={0x138, 0x11, [{@in=@multicast2, @in6=@loopback, @in, @in, 0x0, 0x3507, 0x2, 0xa}, {@in=@broadcast, @in=@loopback, @in, @in, 0x0, 0x3500, 0xa, 0xa}, {@in6=@mcast2, @in6=@empty, @in, @in, 0x0, 0x3503, 0xa, 0xa}, {@in=@loopback, @in=@remote, @in, @in, 0x0, 0x3507, 0x7, 0x2}, {@in=@rand_addr=0x2, @in=@dev={0xac, 0x14, 0x14, 0x1d}, @in, @in, 0x0, 0x0, 0x2, 0xa}, {@in=@empty, @in=@multicast2, @in, @in, 0x0, 0x3505, 0xa, 0x2}, {@in=@empty, @in=@dev={0xac, 0x14, 0x14, 0x21}, @in, @in, 0x0, 0x3505, 0x0, 0x2}]}]}, 0x188}}, 0x40000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) dup3(r0, r1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000000)=0x80) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={@remote, @loopback, @local, 0x0, 0x6, 0x0, 0x480, 0x1, 0x480008, r3}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x66}}, &(0x7f0000003ff6)='G\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffffc) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x26140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000140)=0x401, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1445.048224] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1445.097482] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1445.139070] UDF-fs: Scanning with blocksize 512 failed [ 1445.160278] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1445.172899] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1445.198219] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1445.228838] UDF-fs: Scanning with blocksize 1024 failed [ 1445.252599] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1445.279959] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1445.289291] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1445.303290] UDF-fs: Scanning with blocksize 2048 failed [ 1445.309545] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1445.327784] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1445.339264] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1445.350636] UDF-fs: Scanning with blocksize 4096 failed [ 1445.360656] UDF-fs: warning (device loop11): udf_fill_super: No partition found (1) [ 1445.376181] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 1445.390260] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 1445.401955] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found 18:06:42 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x3, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:42 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000f4dff4), 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=@migrate={0x188, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, [@migrate={0x138, 0x11, [{@in=@multicast2, @in6=@loopback, @in, @in, 0x0, 0x3507, 0x2, 0xa}, {@in=@broadcast, @in=@loopback, @in, @in, 0x0, 0x3500, 0xa, 0xa}, {@in6=@mcast2, @in6=@empty, @in, @in, 0x0, 0x3503, 0xa, 0xa}, {@in=@loopback, @in=@remote, @in, @in, 0x0, 0x3507, 0x7, 0x2}, {@in=@rand_addr=0x2, @in=@dev={0xac, 0x14, 0x14, 0x1d}, @in, @in, 0x0, 0x0, 0x2, 0xa}, {@in=@empty, @in=@multicast2, @in, @in, 0x0, 0x3505, 0xa, 0x2}, {@in=@empty, @in=@dev={0xac, 0x14, 0x14, 0x21}, @in, @in, 0x0, 0x3505, 0x0, 0x2}]}]}, 0x188}}, 0x40000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) dup3(r0, r1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000000)=0x80) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={@remote, @loopback, @local, 0x0, 0x6, 0x0, 0x480, 0x1, 0x480008, r3}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x66}}, &(0x7f0000003ff6)='G\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffffc) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x26140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000140)=0x401, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1445.461675] UDF-fs: Scanning with blocksize 512 failed [ 1445.491083] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 1445.504774] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 18:06:42 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x0) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0xe) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1445.594390] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 1445.632622] UDF-fs: Scanning with blocksize 1024 failed 18:06:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x4, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1445.650734] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 1445.675089] device nr0 entered promiscuous mode 18:06:42 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000f4dff4), 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=@migrate={0x188, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, [@migrate={0x138, 0x11, [{@in=@multicast2, @in6=@loopback, @in, @in, 0x0, 0x3507, 0x2, 0xa}, {@in=@broadcast, @in=@loopback, @in, @in, 0x0, 0x3500, 0xa, 0xa}, {@in6=@mcast2, @in6=@empty, @in, @in, 0x0, 0x3503, 0xa, 0xa}, {@in=@loopback, @in=@remote, @in, @in, 0x0, 0x3507, 0x7, 0x2}, {@in=@rand_addr=0x2, @in=@dev={0xac, 0x14, 0x14, 0x1d}, @in, @in, 0x0, 0x0, 0x2, 0xa}, {@in=@empty, @in=@multicast2, @in, @in, 0x0, 0x3505, 0xa, 0x2}, {@in=@empty, @in=@dev={0xac, 0x14, 0x14, 0x21}, @in, @in, 0x0, 0x3505, 0x0, 0x2}]}]}, 0x188}}, 0x40000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) dup3(r0, r1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000380)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000000)=0x80) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000440)={@remote, @loopback, @local, 0x0, 0x6, 0x0, 0x480, 0x1, 0x480008, r3}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x2, 0x0, 0x0, 0x66}}, &(0x7f0000003ff6)='G\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffffc) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x26140100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$TIPC_IMPORTANCE(r5, 0x10f, 0x7f, &(0x7f0000000140)=0x401, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) [ 1445.718228] device nr0 entered promiscuous mode [ 1445.754014] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 1445.803263] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 1445.851526] UDF-fs: Scanning with blocksize 2048 failed [ 1445.858254] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 [ 1445.873638] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 1445.884622] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 1445.891850] UDF-fs: Scanning with blocksize 4096 failed [ 1445.898768] UDF-fs: warning (device loop1): udf_fill_super: No partition found (1) 18:06:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x40000000003, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) accept4$netrom(0xffffffffffffff9c, &(0x7f0000000200)={{0x3, @rose}, [@bcast, @null, @default, @netrom, @null, @rose, @remote, @netrom]}, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb&9m\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x800010000000000d) fcntl$notify(r1, 0x402, 0x0) [ 1445.987030] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 18:06:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x6000, 0x1) [ 1446.042893] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1446.079113] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1446.108484] UDF-fs: Scanning with blocksize 512 failed [ 1446.124998] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1446.139177] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1446.149073] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1446.156362] net_ratelimit: 20 callbacks suppressed [ 1446.156369] protocol 88fb is buggy, dev hsr_slave_0 [ 1446.156424] protocol 88fb is buggy, dev hsr_slave_1 [ 1446.156513] protocol 88fb is buggy, dev hsr_slave_0 [ 1446.156563] protocol 88fb is buggy, dev hsr_slave_1 [ 1446.156658] protocol 88fb is buggy, dev hsr_slave_0 [ 1446.156725] protocol 88fb is buggy, dev hsr_slave_1 [ 1446.242635] UDF-fs: Scanning with blocksize 1024 failed [ 1446.248900] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 [ 1446.258420] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 [ 1446.267886] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1446.275551] UDF-fs: Scanning with blocksize 2048 failed [ 1446.282580] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=256, location=256 18:06:42 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=@nullb='/dev/nullb0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='ntfs\x00', 0x0, 0x0) [ 1446.298312] UDF-fs: error (device loop11): udf_read_tagged: read failed, block=512, location=512 18:06:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x5, 0x0) r1 = epoll_create(0x7fff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000001c0)={0x80000004}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1446.343424] UDF-fs: warning (device loop11): udf_load_vrs: No anchor found [ 1446.369828] UDF-fs: Scanning with blocksize 4096 failed [ 1446.392529] protocol 88fb is buggy, dev hsr_slave_0 [ 1446.393692] UDF-fs: warning (device loop11): udf_fill_super: No partition found (1) [ 1446.397683] protocol 88fb is buggy, dev hsr_slave_1 18:06:43 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1'}, 0xfffffffffffffff5, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$update(0x2, 0x0, &(0x7f0000000000)="fd", 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0, 0x0, 0x0, 0x369}}], 0x2d, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x332, 0x0) [ 1446.583149] kauditd_printk_skb: 7 callbacks suppressed [ 1446.583165] audit: type=1804 audit(1577124403.137:4134): pid=3410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/437/file0/file0" dev="loop2" ino=1753 res=1 18:06:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xa, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:43 executing program 5: connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) socket(0x0, 0x0, 0xff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000280)=@ccm_128={{}, "2afcfcf0a6ca2bcd", "821b010d43c9298fa2d379cc941ed39f", "d6c40dfc", "378b4ef70733db52"}, 0x28) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {0x5, 0x0, 0x3, 0x8, 0x9}}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x8) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) pipe(0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) fcntl$setownex(r2, 0xf, 0x0) getpid() getpid() r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x0, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r3, &(0x7f0000008a80), 0x400000000000328, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC]]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) pipe(0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) bind$packet(r5, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) 18:06:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x8c, 0x0, 0x0, 0x400000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x20}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:43 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000040)={0x1}) 18:06:43 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:43 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1446.871337] device nr0 entered promiscuous mode 18:06:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xe, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1446.919210] device nr0 entered promiscuous mode 18:06:43 executing program 0: [ 1447.160911] audit: type=1804 audit(1577124403.707:4135): pid=3466 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/438/file0/file0" dev="loop2" ino=1754 res=1 18:06:43 executing program 0: [ 1447.352538] protocol 88fb is buggy, dev hsr_slave_0 [ 1447.357694] protocol 88fb is buggy, dev hsr_slave_1 18:06:44 executing program 0: 18:06:44 executing program 0: 18:06:44 executing program 0: 18:06:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:44 executing program 5: connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) socket(0x0, 0x0, 0xff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000280)=@ccm_128={{}, "2afcfcf0a6ca2bcd", "821b010d43c9298fa2d379cc941ed39f", "d6c40dfc", "378b4ef70733db52"}, 0x28) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {0x5, 0x0, 0x3, 0x8, 0x9}}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x8) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) pipe(0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) fcntl$setownex(r2, 0xf, 0x0) getpid() getpid() r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x0, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r3, &(0x7f0000008a80), 0x400000000000328, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYRES64, @ANYRESDEC, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC]]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) pipe(0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) bind$packet(r5, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) 18:06:44 executing program 0: 18:06:44 executing program 0: 18:06:45 executing program 0: 18:06:45 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xf, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:45 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1448.457302] audit: type=1804 audit(1577124405.007:4136): pid=3510 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/439/file0/file0" dev="loop2" ino=1755 res=1 18:06:45 executing program 0: 18:06:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x1}, 0x16, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x56800, 0x0) ioctl$int_in(r2, 0xa831, &(0x7f0000000180)=0x3) fstat(r3, &(0x7f0000000240)) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:45 executing program 0: 18:06:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x60, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1448.746683] device nr0 entered promiscuous mode [ 1448.807591] device nr0 entered promiscuous mode 18:06:45 executing program 0: 18:06:45 executing program 5: 18:06:45 executing program 0: 18:06:45 executing program 5: 18:06:45 executing program 5: [ 1449.527615] audit: type=1804 audit(1577124406.077:4137): pid=3555 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/440/file0/file0" dev="loop2" ino=1756 res=1 18:06:46 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:46 executing program 0: [ 1449.874616] device nr0 entered promiscuous mode 18:06:46 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:46 executing program 5: 18:06:46 executing program 0: 18:06:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xf0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:46 executing program 0: 18:06:46 executing program 5: 18:06:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x300, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:46 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1450.178155] device nr0 entered promiscuous mode 18:06:46 executing program 0: 18:06:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xa00, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:46 executing program 5: [ 1450.418575] device nr0 entered promiscuous mode [ 1450.447618] audit: type=1804 audit(1577124406.997:4138): pid=3593 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/441/file0/file0" dev="loop2" ino=1757 res=1 18:06:47 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:47 executing program 0: 18:06:47 executing program 5: 18:06:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) r2 = dup(0xffffffffffffffff) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f0000000080)) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r3, 0x0, 0x20004850) getpeername$tipc(r3, &(0x7f00000000c0)=@id, &(0x7f0000000100)=0x10) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000000)={{0x5, 0x1f, 0x87, 0x1, 0x7, 0x20}, 0x809}) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xe00, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:47 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:47 executing program 5: 18:06:47 executing program 0: [ 1451.324900] device nr0 entered promiscuous mode 18:06:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xf00, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1451.375437] device nr0 entered promiscuous mode 18:06:48 executing program 5: 18:06:48 executing program 0: [ 1451.512506] net_ratelimit: 26 callbacks suppressed [ 1451.512515] protocol 88fb is buggy, dev hsr_slave_0 [ 1451.522730] protocol 88fb is buggy, dev hsr_slave_1 [ 1451.554369] audit: type=1804 audit(1577124408.097:4139): pid=3656 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/442/file0/file0" dev="loop2" ino=1758 res=1 18:06:48 executing program 0: 18:06:48 executing program 0: 18:06:48 executing program 5: 18:06:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x13f1, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') fchdir(r0) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) r2 = socket(0xa, 0x0, 0x8) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r2, 0x0, 0x20004850) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000240)={0x4, 0xa9, 0x5, 0x1, 0xcb, 0x9, 0x7, 0x1, 0x40, 0x4, 0x6, 0x2, 0x9c, 0x8}, 0xe) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000180)={{0x4, 0x20, 0x7, 0x8, 0x7f, 0x4}, 0x7f}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8000) ioctl$SNDRV_TIMER_IOCTL_INFO(r3, 0x80e85411, &(0x7f0000000080)=""/129) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:48 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:48 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x3f00, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:49 executing program 5: [ 1452.426793] device nr0 entered promiscuous mode 18:06:49 executing program 0: [ 1452.539970] device nr0 entered promiscuous mode 18:06:49 executing program 0: 18:06:49 executing program 5: [ 1452.632747] protocol 88fb is buggy, dev hsr_slave_0 [ 1452.638466] protocol 88fb is buggy, dev hsr_slave_1 18:06:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x4000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1452.714514] audit: type=1804 audit(1577124409.267:4140): pid=3701 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/443/file0/file0" dev="loop2" ino=1759 res=1 18:06:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x6000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:49 executing program 5: 18:06:49 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0503000023002f0000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605", 0x28}], 0x8, 0x0, 0x0, 0x50}, 0x0) [ 1452.953240] protocol 88fb is buggy, dev hsr_slave_0 [ 1452.959051] protocol 88fb is buggy, dev hsr_slave_1 [ 1452.965317] protocol 88fb is buggy, dev hsr_slave_0 [ 1452.971033] protocol 88fb is buggy, dev hsr_slave_1 18:06:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xf000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:50 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:50 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x1, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x13, r1, 0x0) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000000)) 18:06:50 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3b, &(0x7f0000000080)={0x0, {{0xa, 0x4e23, 0x200, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{0xa, 0x4e23, 0x7, @remote, 0xffff}}}, 0x108) openat$bsg(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bsg\x00', 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8001, 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)='\b', 0x600}, {&(0x7f00000001c0)="5ef137f83d23b9b56fc649df1898ef9a2028498ebd23d2128d835b53dbf90b02669b8208259c006a3c19cfaf7e16bcfc42107df31c2a22741420fc3c0ad84a77dd97bf907c79cf905f16f3761be019006de6aec265985a30b21cd2c7ad80f08a21177e9260f6a9700487abf05f1c38ed134873f7c40d95289f3ce00f6be592e4c9c8547100d14a405f22a0344c256530f52e62c5506008e9b0c945e6d13a84f6c04951b0e117cf0b2b11f097e3b95d37de6369277912fd", 0xb7}], 0x2, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r3, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKRRPART(r3, 0x125f, 0x0) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)='s', 0x1, 0xfffffffffffffffb) keyctl$search(0xa, r4, &(0x7f0000000240)='trusted\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0) add_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000340)="10f6ea104a5bc8d9ad410c74df489c95b99853072f7cdcfb3cc87089946a1580ae5341c4ae729ffd27ca1de9f3c3f22d88691aef20837518a56b53aced16c8aaf3a3ae1205c811746ec05755beea5c2e241e3734f7e962136302899c452780b6037b357c92072407fb50fb8387058205c7798e433e7fffcae7ce012c20759748bc16d5d7e0742a62859485de9d812e25cd2253cd77515817e65a4701eff29749da33473e02e8b771dc9ce6f15a237d263d4262bfe004f1", 0xb7, 0x0) 18:06:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r1, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000080)) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x400000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) r6 = getgid() write$P9_RSTATu(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=0x0], 0x1dd) r7 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r7, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r8 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r8, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) syz_open_procfs(r8, &(0x7f0000000600)='net/ip6_flowlabel\x00') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xf113, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:50 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x30000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'bpq0\x00', 0x420000015001}) write$tun(r0, &(0x7f0000001540)={@void, @val={0xfef1}, @mpls={[], @ipv4={{0x5, 0x4, 0x0, 0x0, 0xfc0, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x14, 0x0, 0x0, @multicast2, "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"}}}}, 0xfca) [ 1453.795127] device nr0 entered promiscuous mode [ 1453.803213] device nr0 entered promiscuous mode 18:06:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:50 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00@\x00\x00\x00\xf7\x00'}) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 18:06:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x34000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1453.960479] audit: type=1804 audit(1577124410.507:4141): pid=3777 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/444/file0/file0" dev="loop2" ino=1760 res=1 18:06:50 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x3b, &(0x7f0000000080)={0x0, {{0xa, 0x4e23, 0x200, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{0xa, 0x4e23, 0x7, @remote, 0xffff}}}, 0x108) openat$bsg(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bsg\x00', 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() tkill(r1, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8001, 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)='\b', 0x600}, {&(0x7f00000001c0)="5ef137f83d23b9b56fc649df1898ef9a2028498ebd23d2128d835b53dbf90b02669b8208259c006a3c19cfaf7e16bcfc42107df31c2a22741420fc3c0ad84a77dd97bf907c79cf905f16f3761be019006de6aec265985a30b21cd2c7ad80f08a21177e9260f6a9700487abf05f1c38ed134873f7c40d95289f3ce00f6be592e4c9c8547100d14a405f22a0344c256530f52e62c5506008e9b0c945e6d13a84f6c04951b0e117cf0b2b11f097e3b95d37de6369277912fd", 0xb7}], 0x2, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r3, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKRRPART(r3, 0x125f, 0x0) r4 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)='s', 0x1, 0xfffffffffffffffb) keyctl$search(0xa, r4, &(0x7f0000000240)='trusted\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0) add_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000340)="10f6ea104a5bc8d9ad410c74df489c95b99853072f7cdcfb3cc87089946a1580ae5341c4ae729ffd27ca1de9f3c3f22d88691aef20837518a56b53aced16c8aaf3a3ae1205c811746ec05755beea5c2e241e3734f7e962136302899c452780b6037b357c92072407fb50fb8387058205c7798e433e7fffcae7ce012c20759748bc16d5d7e0742a62859485de9d812e25cd2253cd77515817e65a4701eff29749da33473e02e8b771dc9ce6f15a237d263d4262bfe004f1", 0xb7, 0x0) [ 1454.391234] device team0 entered promiscuous mode [ 1454.472509] protocol 88fb is buggy, dev hsr_slave_0 [ 1454.477725] protocol 88fb is buggy, dev hsr_slave_1 [ 1454.487812] device team_slave_0 entered promiscuous mode [ 1454.522856] device team_slave_1 entered promiscuous mode [ 1454.540500] 8021q: adding VLAN 0 to HW filter on device team0 [ 1454.629864] audit: type=1804 audit(1577124411.177:4142): pid=3794 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/445/file0/file0" dev="sda1" ino=17777 res=1 18:06:51 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00'}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x180, 0x0, 0x0, 0x0, 0x80000000000}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) r2 = socket(0xa, 0x0, 0x8) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r2, 0x0, 0x20004850) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080)={0x8, 0x8}, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x400300, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:51 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:51 executing program 5: setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0xff}, 0x4810, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000001c0)={0x3, 0x7fff, 0x8, 0x1, 0x1b, "b04e1e27415d23ccb9ec8c4bd7ff8a3892ef7e"}) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000280)) getpeername(r3, &(0x7f0000000100)=@can, &(0x7f0000000180)=0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x10001) read$FUSE(r1, &(0x7f0000000380), 0x313) r4 = socket(0xa, 0x0, 0x8) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r4, 0x0, 0x20004850) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x22400, 0x0) bind$netrom(r5, 0x0, 0x210) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, 0x0, 0x0) 18:06:51 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1455.230976] device nr0 entered promiscuous mode 18:06:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xf0ffff, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1455.271286] device nr0 entered promiscuous mode [ 1455.287258] device nr0 entered promiscuous mode [ 1455.450660] audit: type=1804 audit(1577124411.997:4143): pid=3827 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/446/file0/file0" dev="loop2" ino=1761 res=1 18:06:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x1000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) r2 = socket(0xa, 0x0, 0x8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) mkdirat$cgroup(r3, 0x0, 0x1ff) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f00000001c0)=0x0) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4004080, &(0x7f0000000240)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'vfat\x00'}}], [{@euid_lt={'euid<', r4}}]}}) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r2, 0x0, 0x20004850) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x2000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1455.949327] 9pnet: p9_fd_create_tcp (3875): problem connecting socket to 127.0.0.1 18:06:52 executing program 5: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ocfs2_control\x00', 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x02', 0x1ff) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/\x00\x10\x00', 0x40000, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000003c0)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x2) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r2, r1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) dup(0xffffffffffffffff) r3 = inotify_init1(0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400000) r5 = socket$inet(0x2, 0x0, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r5, r6, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x110, r6, 0xd1e98000) getdents64(r4, &(0x7f0000000d00)=""/232, 0xe8) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r7, &(0x7f0000000040)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1000000000000057, 0x0) [ 1456.203080] serio: Serial port pts3 [ 1456.318337] audit: type=1804 audit(1577124412.867:4144): pid=3865 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/447/file0/file0" dev="loop2" ino=1762 res=1 [ 1456.393980] 9pnet: p9_fd_create_tcp (3890): problem connecting socket to 127.0.0.1 18:06:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000080)) [ 1456.610260] serio: Serial port pts3 18:06:53 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x3000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:53 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00'}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:53 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1456.739773] device nr0 entered promiscuous mode 18:06:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x4000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1456.792609] net_ratelimit: 6 callbacks suppressed [ 1456.792617] protocol 88fb is buggy, dev hsr_slave_0 [ 1456.802779] protocol 88fb is buggy, dev hsr_slave_1 18:06:53 executing program 5: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ocfs2_control\x00', 0x2202, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz0\x02', 0x1ff) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/\x00\x10\x00', 0x40000, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000003c0)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x2) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) dup3(r2, r1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/180, 0xb4}], 0x1) sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) dup(0xffffffffffffffff) r3 = inotify_init1(0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400000) r5 = socket$inet(0x2, 0x0, 0x0) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r6 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, 0xffffffffffffffff) sendfile(r5, r6, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x110, r6, 0xd1e98000) getdents64(r4, &(0x7f0000000d00)=""/232, 0xe8) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r7, &(0x7f0000000040)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1000000000000057, 0x0) [ 1456.847566] device nr0 entered promiscuous mode [ 1456.965303] device nr0 entered promiscuous mode 18:06:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xa000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1457.047104] serio: Serial port pts3 [ 1457.077417] audit: type=1804 audit(1577124413.627:4145): pid=3934 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/448/file0/file0" dev="loop2" ino=1763 res=1 [ 1457.113295] protocol 88fb is buggy, dev hsr_slave_0 [ 1457.118937] protocol 88fb is buggy, dev hsr_slave_1 [ 1457.125176] protocol 88fb is buggy, dev hsr_slave_0 [ 1457.130686] protocol 88fb is buggy, dev hsr_slave_1 18:06:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x4aac3e7cbcc29033) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) sendfile(r2, r3, 0x0, 0x0) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) r4 = socket$inet(0x2, 0x0, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r4, r5, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xe000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:53 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400000) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) futimesat(r0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000780)={{}, {r1, r2/1000+10000}}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='oom_score_adj\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000000)) r4 = open(0x0, 0x0, 0x80) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40010, r4, 0xe036f000) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x81640303}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xd0, 0x0, 0x100, 0x2, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xfffffffffffffd9d, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x70}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2941}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc0000}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r6, 0x28, &(0x7f0000000340)}, 0x10) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r8 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000e00)=ANY=[], 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x1) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x210002, 0x0) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000300)=[0x1, 0x8]) write$P9_RATTACH(r8, &(0x7f0000000080)={0x14}, 0xfffffff4) 18:06:54 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400000) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) futimesat(r0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000780)={{}, {r1, r2/1000+10000}}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='oom_score_adj\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000000)) r4 = open(0x0, 0x0, 0x80) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40010, r4, 0xe036f000) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x81640303}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xd0, 0x0, 0x100, 0x2, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xfffffffffffffd9d, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x70}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2941}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc0000}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r6, 0x28, &(0x7f0000000340)}, 0x10) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r8 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000e00)=ANY=[], 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x1) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x210002, 0x0) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000300)=[0x1, 0x8]) write$P9_RATTACH(r8, &(0x7f0000000080)={0x14}, 0xfffffff4) [ 1458.216381] audit: type=1804 audit(1577124414.767:4146): pid=3956 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/449/file0/file0" dev="loop2" ino=1764 res=1 18:06:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xf000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:54 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:54 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00'}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:54 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1, 0x20) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1458.500379] device nr0 entered promiscuous mode 18:06:55 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x3f000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1458.522863] device nr0 entered promiscuous mode [ 1458.593560] device nr0 entered promiscuous mode 18:06:55 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400000) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) futimesat(r0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000780)={{}, {r1, r2/1000+10000}}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='oom_score_adj\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000000)) r4 = open(0x0, 0x0, 0x80) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40010, r4, 0xe036f000) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x81640303}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xd0, 0x0, 0x100, 0x2, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xfffffffffffffd9d, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x70}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2941}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc0000}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r6, 0x28, &(0x7f0000000340)}, 0x10) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r8 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000e00)=ANY=[], 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x1) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x210002, 0x0) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000300)=[0x1, 0x8]) write$P9_RATTACH(r8, &(0x7f0000000080)={0x14}, 0xfffffff4) [ 1458.632473] protocol 88fb is buggy, dev hsr_slave_0 [ 1458.637639] protocol 88fb is buggy, dev hsr_slave_1 [ 1458.642793] protocol 88fb is buggy, dev hsr_slave_0 [ 1458.647894] protocol 88fb is buggy, dev hsr_slave_1 18:06:56 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400000) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) futimesat(r0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000780)={{}, {r1, r2/1000+10000}}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='oom_score_adj\x00') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000000)) r4 = open(0x0, 0x0, 0x80) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x40010, r4, 0xe036f000) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x81640303}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xd0, 0x0, 0x100, 0x2, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x44, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xfffffffffffffd9d, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x70}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2941}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc0000}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r6, 0x28, &(0x7f0000000340)}, 0x10) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r8 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000e00)=ANY=[], 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x1) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x210002, 0x0) ioctl$EVIOCSKEYCODE(r9, 0x40084504, &(0x7f0000000300)=[0x1, 0x8]) write$P9_RATTACH(r8, &(0x7f0000000080)={0x14}, 0xfffffff4) 18:06:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x40000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000080)={0x3, 0x0, 0x19, 0xe, 0xd6, &(0x7f00000006c0)}) 18:06:56 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00'}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:56 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x60000000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:56 executing program 0: r0 = gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x237) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x15, 0x0, 0x2c, "9cf9d8af94669ed80fc3cf752673473f"}, 0x15, 0x2) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x50, &(0x7f0000000080), &(0x7f0000000000)=0x2c) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000080), &(0x7f0000000000)=0x2c) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000340), &(0x7f0000000000)=0x70c1d65fc9bab740) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x50, &(0x7f0000000880), &(0x7f0000000140)=0x157) r6 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r6, 0x0, 0x50, &(0x7f0000000080), &(0x7f0000000000)=0x2c) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="1e9cca5bd03f4acb6c7ac8edcbe9d2a998ebbb8a96e41cd2509671b6012d7fff12a5e40d91c94170db5ab9c28da30272f5f6b28fadb4e78ec095ee7eb9f1bfd04301a519b57097ffe001707a7225ae", @ANYRESHEX, @ANYRESHEX, @ANYPTR, @ANYRESDEC=r5, @ANYPTR, @ANYPTR64, @ANYRES32=r6, @ANYRES16], @ANYBLOB="feb4e48b6ee1dc2efccbd47ddad9fac44f233fe98740dcc01d8e98d263b9cc819f8c5159ffc1d4a803de9e8a6663588a6237af1561aa69bd10d1f9034038803a01cf67f6f78a1c3cbc80d71670a7115a0027c85ad69bb028a5cc9bab1f7af8b648109954df4ab1b2cb5a5219", @ANYRES32, @ANYRES64=0x0, @ANYRES32=r7, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYBLOB="a07067a5abb7ae9f95b26ac8d9f7da51dd095f51b32b23de929368d0633638113521d2cf5209a8798ac219824c737f55cf11310794b1636bea08daf334277bb7f0", @ANYRES32, @ANYRESDEC, @ANYRES16=r1, @ANYBLOB="118836de749cda8ea9dea99e3edb83a44c8f4b66f5f1230dfcc327165afe47b3c21026c669d9051edb4c169f109129ca86344064ce28a1926fe6190fb71cb4a69a29bf3bbae002e5f38075d9577f8933f71b7bbea6e2be34f135b30643c731c7f4fa315a5a4764b1f39e5c78ede71ec2ac1e685b0dcfefa1e9b4455c185293167fcf941f1ddb3df92b5b4afae052051adf2e7f"], @ANYRESOCT]], &(0x7f0000a8a000)=0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r8 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r8, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1459.864389] device nr0 entered promiscuous mode [ 1459.910203] device nr0 entered promiscuous mode 18:06:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x9effffff, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1460.051845] audit: type=1804 audit(1577124416.597:4147): pid=4040 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/451/file0/file0" dev="loop2" ino=1765 res=1 18:06:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(r2, &(0x7f0000000080)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:06:56 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xf0ffffff, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1460.311380] audit: type=1804 audit(1577124416.857:4148): pid=4068 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir125094450/syzkaller.dspM2b/46/file0" dev="sda1" ino=17576 res=1 18:06:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xf1130000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="f36e0f20e06635002000000f22e00f30f20f1024660fdb03b894008ed00f20d86635200000000f22d80f35650f01c90f30", 0x31}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r3, 0x0, 0x20004850) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r4, 0xffffffffffffffff) r5 = socket(0xa, 0x0, 0x8) sendmsg$key(r5, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r5, 0x0, 0x20004850) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, 0x0, 0x0, 0x81003) r7 = socket$inet(0x2, 0x0, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r8 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r8, 0x4c00, 0xffffffffffffffff) sendfile(r7, r8, 0x0, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r9, 0x400454cb, 0x0) mkdirat$cgroup(r9, 0x0, 0x1ff) ioctl$KVM_SET_CPUID(r9, 0x4008ae8a, &(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000002580)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESOCT, @ANYPTR64, @ANYRESHEX=r0, @ANYPTR, @ANYRES16=r4, @ANYRES16=0x0, @ANYRES16], @ANYRESDEC, @ANYBLOB="f3844505f455f382e93dd48293db859900192fd102ce2d8f79af1aafd4374c55ba72db250ddc423a09d36a3925b80f17c17d56288aeb5721664478e6fe56f8813cd01556a2e8f09ca1e1f13134da3fca40c7b33f11a52620fc8bad273c56795f13f29f41b1c92d44b06db3c52afb961496a551345453adf4c8b0d2fd2dd823c77e055b5d09d7ca5d20a3e4046222cfe8b5649298922859a6635aa402b1b00d0a5c89055278c46c770630e934456dbdb774f9dc2c5d93c067d594113802d5e3ed821cfe7a159acfa62d931ff452d68b9251a96995b5de98861b137285a0a4e19965696d6ad83c69f3caea3d222032c1d3487ae46c2ab358828def8a37501bdb0a924280f5b0264aa2a43ce03db3ecbfa4deb90324a2af8d544f75e3304291503e27998eef42ea53065f2db52f777b13654218255cb3e08c2234f7910175cebcee1ff95619e2268f8992f3c028c8cf6ad1e36eebb1496cfc58d0877bb8acc3876e6d06ea4736d747683f38bd360b7b6e7227962cc3590db5813138588062b6e7c96bd1bf50beb943328db1b29c9c0326ea379ee7eef5683b34f77bb8ad60a4ffd40334087b4d6ed268376a19a6610f40a61f9bcf8cfd81b8176edaf264fb09b67c86e6ac7da190578b558f3588c938576fc68127d29799bbf656c7bb6b5a3b12f56312baee60e394cf34ca3ef5c39b0f10a14bc33a552c122dca73b80c66474c2e6e4f3a39e2e4e987655e5287a5f9a9235b7bf1e44435f2b9b2af7ee90cb124a72709d364c6fff5171b049e2521f1971779b10b24f61ecd105fbabbc229a1aee115166e51a2d46364406ca5fa08fded1956c7747a4c29f151507fe2caa4736c5e562973df063cefe595a40a0e93325c87889dd8ed156466c1185ae8926d57d129e402bb399f9c47bf549c727d3972cea946c2f9493c15dba9770698b0f3958563ba4df589d7e604dd15e9aded879f6e3f9bb6731a20748fcff4e49155fcda6e5499bfdd81562ac5688422a01c60921e4d22d71a00d14e84203c288c6361ed00d57521de30aa62f6db9a3bcc1e8e2a23c85af5ab4d17ba8af72ad9cdf0a6d1a56b9aa79e3cfec2a3185db4a8fe7923ffc0284a7c98cca24bbf1b7797545c89e72b3f59f6067f14db204dd1a3d0c098447551919e89435f86112a8e893fca028bfd81e61ce3605f1197fb9ddcdbf4eb74f75bf9829904fb57f053cba3f516e307805cd6bd25a197cb968d31bd96b664174a17594d158f94913e5a79d44ca0e3718420168c1ad7686bc5efce8a5f0d81bc13410a5e6e1a2cbe7cb6e69de74bf561eea29ddcdc70cc9f6d9d382f60805d6768d1a5fe3ff6d33ed56590a159b00e0edc4586feaaf168ddcf08b21b9dd16b4d95eac582368e0babf7a1dda203d3485b891ee228d9ba148111d2eec5286688d737745c10d499e596ee5653e82dc28dfe27fc6271f8bce922c162447f2effe678c5076a349bbdb7d911f35019a4072fa085a7d4c81d28242ea14e5100618db4f8adac672c8da03b0b32e7083cfe0cd28ea8880b7fff6cd72fbbdb69834ddad9132d494420710f728ddc0bb3a942234119e3469533647dee82bc4ea55349efbf0763fb4dbb025a93517d450c1aca48db0b3f54ebbe141584abad42f99ff63e38fbea362b3a8238a579cb80aa90b301bc62d229b05b01437d91fee95be0a6e4390fb7b617172805621df0ed8002d3d3ecbcbd914585057be5b8d4796f9f348c0d9696791d73130f5829f52af04488f4a2943298a6fe22d2d6ca0093135bdb76a2f2a24c182c65ef95bef9186a9eb8beebeb928469e6e7ba9ec2acd703406fcc31cc9ade707c916d4cb917a6f49a7c096e3b1184e4eb8ac683205e33936d7936257dc35dc1d5996bac446acadab4624e8d896ecf8a98d6f09616a56db426cb28309ae89e335996b9f6cf5a94a8592a1e7f45aed4e7811f33b38bea90b3b222662201422ec22d0007c9ad9d34e6faafd2d7ea47bcf2543b1736b39e4fe9ddda628c505dd0f27401739c95d63bcc3869f9c9357cd0520f9ae24a3c74685c86859e76b3bdcbab4a60fd9a6ee4ca8d51f78aecba6b8e733cb9bfd0f8ab21ab16b938eb37d317df5b14990d23124e4ebc4018fd91b7ac06384b7c7a1e18c4b450520ab1b6d63cf715194f915280e631fba7d1d791943f28f49c328e035b3147ca1f162554bd3883a8dcbaf973273d785df07edb0d1221dc1b6ef94a1bc1c9c1916be7560326d6071a7a95717bc13bd69741c292af9ca5869b8faeedbe16588f021aea26c5fecadf5f31bc87856df856e1e8582658974b0f2c1580dcb8319e14d6581196444c1809833fd60cc57e3ba957ba5207a7a916f6df5524356bfbef35478864cb8597aee97ff47622699ba68ce7eaadf134d96950f1e1d9a357713fbf1912430cf77ec1f1c31e0c6f274828119faac6b85af953fe0fc84e7f56bd8a1dd641b6914fb6b94a75974c104e3eb73c755e94442a8bbfd5f3719845ba660bee45fa7814e8c8e3e68971f0f6469ec35468520e6d84df8798f85896e0903bdcc7d7e0e1e08f47ac5751f9fe4f7ff1db331b9e0bd2e3e602be8824c173ceed97ddade9fd1471873095f02ac7234046b20e4a860d7c889bccd529ed5060720ed597b10de3b435fbb4d1eb8a256ce6d681f748c106d6b94a68b1c719cf7f335c7138c6ae1a25c13608c8a09a6139f35f253890dfc74ca7c930049349c2f76af812a8238ee0d0ca056beb904b02689f35d5a3979516ee39552246c0708b8dc7d74fcd57101a48dad20dc2e7aad8a8fdec1998e9379288bbcb664210f7d2985ab8fbda3405ccc8fa88bc81fe1791fc1d8ba385cda818a1d80ca80d858dce00af9e289516d8ebe5a1fb7d33d7670d2e1cf63244583ec4ae91b81af2816bbc2d6aaefb4ada07c9c12b4f8bd1f9f5f204c55ac82dbe62cc9b4c1ebbe81011caf7fba09cf2ed538942a6fac55ed22232e5851c3c531dc6e78fcb1e8d69e06da5e63c04fa03605538c353c592e2ee787ea2e15840d13e82e574497523a96e1d1829c7171e4b165ee65b94f2cd118d821243a771d4ce2844892738e21223379ae57dfbbd21b6a37836ca727dd04b7e29bb3db8a6cfa9e9e6208f6c6f8b067b3e38c17ff7c4d8bd82bcdbec043481787cf710fbbf2d31b6b03773df25e139d7678691d99b00f0f1facdd7d5d3d4e981e703971695615395860c7371117f9bd7234cfdf70cc0ea0e31739e3987f62802fcaf379b552a107fc4c91fbf0a4b6e15b00b659f5bb54b569b4bbb2c52aade118edbe37593c09af4a1c023bb7e4d9b99487549c150779f6e75f31c510568307f5d221936b2dc12508297b4cd65d0b9cf6b68ed4b910a814e96dacf57af0416dbd163eb84005962556fc2bca3da5e8b3a84590edebd2018b11f6375bcf5cd75a26c6d971aa34b39ea2231c94197b056354ff5e0313e4e81b82659faaf6977024efebe26c3aecb6c3cb0f5be663f53fa38ce892d4c8e3d80b7cd9a568b21417790a0aa1f9800ee0c99c458752654b5fc9b48fc2b6c6cf8f3dfd0d6f8a9e8ee82d439a17af0ffd390d0b94675a005d7683344de6e90283e85e17556d778dcfd0fe7d98beb33cdaf5880241fadf35bceb6988d89760eeb2382209a0ca3f2cccd3319ee580851b9f49e83e92406879395bad5e326369b716df4a0c069baab77ff4cb22b4492d564d545478717cc29f913eebe4e5dd1b75e48f3ea3b6738b04b99a721dc9a84e37ed563bf12446b8872a1858297fece9a804b346a1e31ed0b2fac57812d891e68a7eade7a7dbaaf9477dddd866d646838b795398d7465d8c407f5827968347afd6d926c47a0b525193dd3586ff3e4fa2abdb12cc175744884f9214172b6716a868d5f7b029c42e4cbafcaaf95a9c97236b64c056b801fec67f465427eae8ba39c413b213869f80edabc0b251cb9b69d3712b577090683b9f371515691ee8297155fd2286b0205c34604e3784d209b0be2f7a56dda3c000cb128dd46338f9e84363c1dd932570decc9d406a59aa07f32a452aae69851c0fada5c7d17a2d97b3cccfdc4037bad34dbcc2a13d76ffe283b9f954fe376bb2650541f2115ea6d85f827e16ec7b7b45b2643fcbaaf582c423ae098ca2cff0acd71be3250b3145e7b74615a1b3fd52a41ec6c59ca459ff7774b6ee04659546d9a0bb5fda85d3ba8869a1b14cae6bb2429323e94c0c4eee255800c08eee002226f0dd41d53ae2ad3df69fa8420079b83311723e2855cc6ccc55027a6a5109b6512fed998246d1c0241e41582f037279d496183174b9b92738fbde2ebc2f3479164a77852be5923dadf7a4b037ef227fec5eaf8466b89241b1bcf2652df89f6065890e5877b7319f73f330bd1043f3233b126606624798f2fbb0bf12f30fda90850b6d4b756dade3c1a703178e37a9fdfc66100b2c4b05b81480b650a83a678d284adb8c939fab0fbe95b084eedcf08966919ac22d5b9a374e494e44a638f61c4574ef3112fd49db03594f3d5374e152310550453ed26973a9417e5cf4fbb003fe5ed646ca67d70e3894cb044258ee06b3ac305c8eb66ab98793ef96308b422235dd97ed83ce2a1886739ffe16badf3478df87f75a3d64629a179e946b88a26cc713c46cf3a078a4fea2ef712851f8e5615a675b776aadb806b799cabbb7dab8c760e68799ac403c7ee8c2a74570a93fcb67de44baa2e4d08d50a37fd2f3f679c4749e41a87de3f9685a15c85cee22638ea2340af37101ce36976e958d670bf5120191bc6a9a3271bd3574c2c506866a2172b72e0dc739395d95282e7efec802398b9d25108559fdd185d6b3833eea97d95cbb19b42871b4b06cc53aebcc80c08a21a428969094941f91bd1012396e76fb02022f9b6ca741de3d9e69dbcd09fd61eeab1816a8f0012776115aad2ca68351bb1187743157c991f29e2ff279c4a06bb8fe326ded6d33191a020682bc0687e49a1d53887940ee4c248d2c90e6ab8c1b84c2ad029b735c19d02d404858db568b9de961115d9fe019a590e3e6bd98d2962caa31e15b152611b878e669176a1d4bfb4a2293d89a75947fa9518555a2c030a8a9b38f9d4012c71d08e5805cac399b36a2c69764daa05e6ad48019669483837c3bc641d53135dc87ff8d98ffd0e09b2a43166623b16b6d8b5420e2097facb498f7d313a004e720f255501d917eb450e91003dda2d71bbad3eaf4ac229f5010e7a532d0f5c7e5a7e129d58edeefbbd2f03816602f938054cea4a01fecd9e372584d879d395068f8d1451ca185cb066371e9d7531c511481ddc6c98504a9dece3d37b5272f41166f52878d0cf2f32b32068b1b9e0814bb8c676ea83f78c84c0cc3db2050c25454478b61d0a18238ec916bc9f18f7c0f2c9d982d123c086cd9a551d4a3c8f85bd884d4b9d34cc4c45c8ec67938e84c14acb9f15eb961bb399ffad3d8ddf0bdf110e9347dc01c648a1bafb89003f0e3ffda2a65b1647e32b9735d5fa3a6670009d9433dec0cd2125c05ddfac7b320ef8d37fd7642ab3563a8a84171b1dcb2b66020443022a9919b494b0482eda28608708237c4723844041b3328ff2ab871c1ac3f65d09c47e2de861df254e2a8a3d2c40e8d1686b74c9ad401bd74aca2a092a140b5c98179a6a646fb6629864b4ec672bdfe110fb41b6987f49200a6fa5cbd1a329a588159f87f9c832b7946fbed98e40183249d73498db38d5ce62f11bc22ac244d397770e1adefc35e1ee3669cf8142281d5f54dadab7faacb4c73d09a8f7d2692bee2da3ee28bce84b6e958d", @ANYRES16=r5, @ANYRES64], @ANYRESHEX=0x0, @ANYRESHEX=r6]) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 18:06:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xfffff000, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:57 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1461.340937] audit: type=1804 audit(1577124417.887:4149): pid=4080 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/452/file0/file0" dev="loop2" ino=1766 res=1 18:06:57 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00'}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000100)) syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0189436, &(0x7f0000000040)) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r4, r5, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={r4, r3, 0x0, 0xffffffffffffffc1, &(0x7f0000000a40)='\x00'}, 0xfffffffffffffc26) ioctl$TIOCNXCL(r3, 0x540d) 18:06:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xffffff7f, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1461.509852] device nr0 entered promiscuous mode [ 1461.538863] device nr0 entered promiscuous mode 18:06:58 executing program 5: openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x2d0) r3 = syz_open_dev$amidi(0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r4 = socket$inet(0x2, 0x0, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r4, r5, 0x0, 0x0) r6 = dup2(r3, r4) fdatasync(r6) ioctl$int_in(r1, 0x5421, &(0x7f00000001c0)=0x1000) connect$inet6(r2, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "67fe99d8cc1b9c2e", "3ae137adbdf67e59f8eb33778520749e", "78f3a4f7", "716a7d3fa373e415"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 1461.867303] audit: type=1804 audit(1577124418.417:4150): pid=4133 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/453/file0/file0" dev="sda1" ino=16609 res=1 [ 1461.913362] net_ratelimit: 8 callbacks suppressed [ 1461.913383] protocol 88fb is buggy, dev hsr_slave_0 [ 1461.924946] protocol 88fb is buggy, dev hsr_slave_1 18:06:59 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000180)) r1 = socket(0x2000000000000021, 0x2, 0x0) connect$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0xe, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x24) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @ipv4={[], [], @dev}}}, 0x24) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f00000001c0)=0x1) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/sockstat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x3) socket$nl_route(0x10, 0x3, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) socket(0x0, 0x0, 0x0) socket(0x0, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, 0x0) sendto$inet(r3, &(0x7f0000000240), 0x1192aca8268c9077, 0x3, 0x0, 0xffffffffffffff06) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r4, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='i#\x00'/12}, 0x22) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5755cda1c10f7a4, @perf_config_ext={0x0, 0x8b11}, 0x29d912f5e24f2f79, 0x0, 0x0, 0x5}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$inet(r3, &(0x7f0000000040)=""/6, 0xffffffffffffff1e, 0x300, 0x0, 0xfffffffffffffe3d) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x1ff, 0x0, &(0x7f0000fff000/0x1000)=nil}) 18:06:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xffffff9e, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:06:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x400a4, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, r1, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) capset(&(0x7f00000000c0)={0x668aea2062e170fe, r3}, &(0x7f0000000100)={0x3, 0x8, 0x401, 0x3, 0x1, 0x4}) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0xd) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r5, 0x28, &(0x7f0000000040)}, 0xffffffffffffffdf) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r4, 0xfffffffffffffee6, &(0x7f0000000500)}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) mkdirat$cgroup(r6, 0x0, 0x1ff) ioctl$TIOCGPTLCK(r6, 0x80045439, &(0x7f00000004c0)) r7 = semget$private(0x0, 0x0, 0x11) semctl$IPC_INFO(r7, 0x1, 0x3, &(0x7f0000000340)=""/93) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r9, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0x0, 0x0, 0x0, 0x0, r9}}) stat(&(0x7f0000000740)='./file1\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r10, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0x3, 0x0, 0x0, 0x0, r10}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r11, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0x0, 0x0, 0x0, 0x0, r11}}) getgroups(0x8, &(0x7f00000002c0)=[0xee01, 0xffffffffffffffff, r9, 0xee00, 0xee01, r10, 0xffffffffffffffff, r11]) semctl$IPC_SET(r7, 0x0, 0x1, &(0x7f0000000300)={{0x1, r8, r12, 0x0, 0xee00, 0x40, 0xfa}, 0x2, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xd12}) 18:06:59 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:59 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00'}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:06:59 executing program 0: r0 = gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x237) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x15, 0x0, 0x2c, "9cf9d8af94669ed80fc3cf752673473f"}, 0x15, 0x2) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x50, &(0x7f0000000080), &(0x7f0000000000)=0x2c) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000080), &(0x7f0000000000)=0x2c) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000340), &(0x7f0000000000)=0x70c1d65fc9bab740) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x50, &(0x7f0000000880), &(0x7f0000000140)=0x157) r6 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r6, 0x0, 0x50, &(0x7f0000000080), &(0x7f0000000000)=0x2c) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="1e9cca5bd03f4acb6c7ac8edcbe9d2a998ebbb8a96e41cd2509671b6012d7fff12a5e40d91c94170db5ab9c28da30272f5f6b28fadb4e78ec095ee7eb9f1bfd04301a519b57097ffe001707a7225ae", @ANYRESHEX, @ANYRESHEX, @ANYPTR, @ANYRESDEC=r5, @ANYPTR, @ANYPTR64, @ANYRES32=r6, @ANYRES16], @ANYBLOB="feb4e48b6ee1dc2efccbd47ddad9fac44f233fe98740dcc01d8e98d263b9cc819f8c5159ffc1d4a803de9e8a6663588a6237af1561aa69bd10d1f9034038803a01cf67f6f78a1c3cbc80d71670a7115a0027c85ad69bb028a5cc9bab1f7af8b648109954df4ab1b2cb5a5219", @ANYRES32, @ANYRES64=0x0, @ANYRES32=r7, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYBLOB="a07067a5abb7ae9f95b26ac8d9f7da51dd095f51b32b23de929368d0633638113521d2cf5209a8798ac219824c737f55cf11310794b1636bea08daf334277bb7f0", @ANYRES32, @ANYRESDEC, @ANYRES16=r1, @ANYBLOB="118836de749cda8ea9dea99e3edb83a44c8f4b66f5f1230dfcc327165afe47b3c21026c669d9051edb4c169f109129ca86344064ce28a1926fe6190fb71cb4a69a29bf3bbae002e5f38075d9577f8933f71b7bbea6e2be34f135b30643c731c7f4fa315a5a4764b1f39e5c78ede71ec2ac1e685b0dcfefa1e9b4455c185293167fcf941f1ddb3df92b5b4afae052051adf2e7f"], @ANYRESOCT]], &(0x7f0000a8a000)=0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r8 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r8, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 1463.123336] device nr0 entered promiscuous mode [ 1463.183756] device nr0 entered promiscuous mode 18:06:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xfffffff0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1463.352514] protocol 88fb is buggy, dev hsr_slave_0 [ 1463.357660] protocol 88fb is buggy, dev hsr_slave_1 [ 1463.362873] protocol 88fb is buggy, dev hsr_slave_0 [ 1463.367967] protocol 88fb is buggy, dev hsr_slave_1 [ 1463.458946] audit: type=1804 audit(1577124420.007:4151): pid=4185 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/454/file0/file0" dev="sda1" ino=17025 res=1 18:07:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0xffffffff, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x2}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x3}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1464.000729] cgroup: fork rejected by pids controller in /syz5 [ 1464.047672] audit: type=1804 audit(1577124420.587:4152): pid=4208 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/455/file0/file0" dev="loop2" ino=1767 res=1 18:07:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x4}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:00 executing program 5: r0 = gettid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x237) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x15, 0x0, 0x2c, "9cf9d8af94669ed80fc3cf752673473f"}, 0x15, 0x2) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x50, &(0x7f0000000080), &(0x7f0000000000)=0x2c) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000080), &(0x7f0000000000)=0x2c) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000340), &(0x7f0000000000)=0x70c1d65fc9bab740) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x50, &(0x7f0000000880), &(0x7f0000000140)=0x157) r6 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r6, 0x0, 0x50, &(0x7f0000000080), &(0x7f0000000000)=0x2c) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="1e9cca5bd03f4acb6c7ac8edcbe9d2a998ebbb8a96e41cd2509671b6012d7fff12a5e40d91c94170db5ab9c28da30272f5f6b28fadb4e78ec095ee7eb9f1bfd04301a519b57097ffe001707a7225ae", @ANYRESHEX, @ANYRESHEX, @ANYPTR, @ANYRESDEC=r5, @ANYPTR, @ANYPTR64, @ANYRES32=r6, @ANYRES16], @ANYBLOB="feb4e48b6ee1dc2efccbd47ddad9fac44f233fe98740dcc01d8e98d263b9cc819f8c5159ffc1d4a803de9e8a6663588a6237af1561aa69bd10d1f9034038803a01cf67f6f78a1c3cbc80d71670a7115a0027c85ad69bb028a5cc9bab1f7af8b648109954df4ab1b2cb5a5219", @ANYRES32, @ANYRES64=0x0, @ANYRES32=r7, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES32, @ANYBLOB="a07067a5abb7ae9f95b26ac8d9f7da51dd095f51b32b23de929368d0633638113521d2cf5209a8798ac219824c737f55cf11310794b1636bea08daf334277bb7f0", @ANYRES32, @ANYRESDEC, @ANYRES16=r1, @ANYBLOB="118836de749cda8ea9dea99e3edb83a44c8f4b66f5f1230dfcc327165afe47b3c21026c669d9051edb4c169f109129ca86344064ce28a1926fe6190fb71cb4a69a29bf3bbae002e5f38075d9577f8933f71b7bbea6e2be34f135b30643c731c7f4fa315a5a4764b1f39e5c78ede71ec2ac1e685b0dcfefa1e9b4455c185293167fcf941f1ddb3df92b5b4afae052051adf2e7f"], @ANYRESOCT]], &(0x7f0000a8a000)=0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r8 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r8, 0x400, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 18:07:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=@setneightbl={0x50, 0x43, 0x100, 0x70bd28, 0x25dfdbfb, {0xa}, [@NDTA_THRESH3={0x8, 0x4, 0x4}, @NDTA_GC_INTERVAL={0xc, 0x8, 0x1}, @NDTA_THRESH3={0x8, 0x4, 0x3}, @NDTA_THRESH3={0x8, 0x4, 0xa}, @NDTA_PARMS={0x18, 0x6, [@NDTPA_BASE_REACHABLE_TIME={0xc, 0x4, 0x5}, @NDTPA_UCAST_PROBES={0x8, 0xa, 0x8}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000c800}, 0x45) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x0, 0xa, [0x800, 0x100, 0x0, 0x781, 0x3ff, 0x4, 0x8000, 0x8, 0x26c5, 0x8c2e]}, &(0x7f00000000c0)=0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r2, 0xf0, "0ff4f8c55bda231a9a3fcc16a40cd12ff86ef7d27b47850f63cc029eb19b0cab1d0a25817f5dce7893a9b64fdf2be4436a9b480c44f256a926ccf1223dc5cabc789159ca165a19fc6d2350108a4b2eb69eab809b1e14e77ce5db3a33ddb9ce375f2ec65af19cb5b8ba19b4cb796b71546b2477689ae689bb193157953b33fabe5d5859c0746c35b861f57020afe21859ee5bd8364d95eaf3a90c621a4d3875982a38f012fa089593aa446ddf37f379ee0f875714cdf87f50aec66d8b9df3237dff9abe4569fe3292e9103c098aac89c22e9bc1ec1584960103c355c576dc6e895f4d78936727f676d44d54fea173750f"}, &(0x7f0000000100)=0xf8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x5}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1464.508444] audit: type=1804 audit(1577124421.057:4153): pid=4338 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/456/file0/file0" dev="loop2" ino=1768 res=1 18:07:01 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:01 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1464.779435] device nr0 entered promiscuous mode [ 1464.829849] device nr0 entered promiscuous mode [ 1464.872508] protocol 88fb is buggy, dev hsr_slave_0 [ 1464.877665] protocol 88fb is buggy, dev hsr_slave_1 [ 1464.882846] protocol 88fb is buggy, dev hsr_slave_0 [ 1464.887931] protocol 88fb is buggy, dev hsr_slave_1 18:07:02 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x6}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000080)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:02 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r2, 0x200004) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r3, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r4}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:02 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1466.249232] device nr0 entered promiscuous mode 18:07:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x7}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1466.325330] device nr0 entered promiscuous mode 18:07:02 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r2, 0x200004) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r3, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r4}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1466.406643] audit: type=1804 audit(1577124422.927:4154): pid=4376 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/457/file0/file0" dev="loop2" ino=1769 res=1 [ 1466.953157] net_ratelimit: 8 callbacks suppressed [ 1466.953166] protocol 88fb is buggy, dev hsr_slave_0 [ 1466.963771] protocol 88fb is buggy, dev hsr_slave_1 [ 1466.969820] protocol 88fb is buggy, dev hsr_slave_0 [ 1466.975392] protocol 88fb is buggy, dev hsr_slave_1 [ 1466.981361] protocol 88fb is buggy, dev hsr_slave_0 [ 1466.987041] protocol 88fb is buggy, dev hsr_slave_1 [ 1467.192515] protocol 88fb is buggy, dev hsr_slave_0 [ 1467.197701] protocol 88fb is buggy, dev hsr_slave_1 18:07:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x8}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) mkdirat$cgroup(r2, 0x0, 0x1ff) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000631477fbac14140ce0", 0x0, 0x9}, 0x28) close(r3) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000080)=r3) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:03 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r2, 0x200004) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r3, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r4}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:04 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:04 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x180000) r4 = socket$inet(0x2, 0x0, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r4, r5, 0x0, 0x0) dup(r5) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1}) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r6, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r6, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 1467.501578] device nr0 entered promiscuous mode [ 1467.519802] device nr0 entered promiscuous mode 18:07:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0xc}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:04 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r2, 0x200004) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r3, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r4}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1467.848664] audit: type=1804 audit(1577124424.397:4155): pid=4416 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/458/file0/file0" dev="loop2" ino=1770 res=1 18:07:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:04 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket(0xa, 0x0, 0x8) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r2, 0x0, 0x20004850) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r3 = socket$inet(0x2, 0x0, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, 0xffffffffffffffff) sendfile(r3, r4, 0x0, 0x0) r5 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r5, 0x0, 0x0, 0x81003) r6 = dup3(r3, r5, 0x0) listen(r6, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0x9) sendmsg$kcm(r0, &(0x7f0000003680)={&(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x110040}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000140)="3532c61e1dfa22aaa3c9b2d86a36ca3ce65fae76daebf05b9e21425983d54f3d4fed32f161ef5e864792c583747b3d12ac8df8fb5548fa92d1efdabd2950fe6d1f0f3e3c706176a70e74f3e7155d8dd89ccd71cccfad66662d2313d0a14e234bd8f61bd6e2d43c3e6eacdf8f483999b6d487a6e2de", 0xfffffffa}, {&(0x7f00000001c0)="339884c68d98b7529b2c632730acf2c656a1eec75e02208c14142b301195894467a618832fcaa24dd634b280f17b4acb9101cbc6995b4fe6e4d6d02eb8c04759e16249ab37e3fff526504ab6d14904ab6c7540afe2a3609eb74d551b", 0x5c}, {&(0x7f00000036c0)="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", 0xfffffffffffffd79}, {&(0x7f0000001240)="53f45ec6f5bc5ce5cc167ef34092e4c22a9c2ea6cbb898ff2449fd5cf7899f5d95b0bd3ae16d6eb6c4f23875df703bf016d14546f6830b1f5397398bb341099bceedbef2d88987e7a3cafbba6398c6bc185dd57f36e412944b3281ca17f7419e90e2ed42f4801a9b321f9ecb6f974c8b59ff0f77e8d8936b5576726c9a3f57791e44e936bf06fabf52a6d8cdc01597a74ce0d4dd8a36f13626069bb838dee696e6b29ecf29c9b71c3dfe18e7d28a5065357e38c58f0294e25a8b33588bb8c94bf9f9992fb759b88b470384ec3defcc6fc0f090643e60350e57e1eb", 0xdb}, {&(0x7f0000001340)="4d0858fc62d62e41e8b40c40f94a4796b71c79dc12e87f2f75c5cc549646f5c8fe762cbb749841174b08fa268eb0fd5586ba1ad89c8f255dabd88847ebf35d858718575f12f6c200186e92bace552ff908fb86ac0ed5d27bd1208fb079f50f364c7c6efc93f2b5d7bd7ba4a89e176292e1a6aba91a5bf04910bc68ea0523a807f01b2d186461a7241fa74188a9b1f9b36fdaa41d60", 0x95}, {&(0x7f0000001400)="a40664f40e747fb02a3aa04ce5a6c48905eca336a1e5fa2eb5fa857fcdd3816591b82a2f328663f1c2ced288e106b250cfdc32ad7a25c03474c070e7bc3dbf3758", 0x41}, {&(0x7f0000001480)="53f29ce02a8602c596e1a8bf62dc951476", 0x11}, {&(0x7f00000014c0)="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", 0x343}], 0x8, &(0x7f0000002540), 0x1120}, 0x2000c02b) setsockopt(r1, 0x100, 0x7, &(0x7f0000000240)="1c21afaceb87f9e772cd85c7c8c552c09e3152dcff0204383144c33e0247603850064f531533ef093ef1e022d0862191fe894cde21d7a41598a11d2bd6f41e64e562a58c2c2bc90c1f484e53d02094e931c9fac43e4c0f4cefa02dc0f2d7eaa4", 0x60) close(r1) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x400000) ioctl$TIOCMBIS(r7, 0x5416, &(0x7f0000000340)=0x1) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000000)={0x80000000, "fe8527d84fa8e454c6c6347663df86b4ce143b1ad3cd53ef6403c91778401635", 0x3, 0x5, 0x3, 0x80000, 0x1, 0x4}) 18:07:04 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r2, 0x200004) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r3, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r4}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1468.153453] protocol 88fb is buggy, dev hsr_slave_0 [ 1468.159130] protocol 88fb is buggy, dev hsr_slave_1 18:07:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200)=0x9, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x400000) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400000) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) chroot(&(0x7f0000000100)='./file0\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e20, 0x2, @local, 0x5}, {0xa, 0x4e24, 0x0, @mcast1, 0x9}, 0x7, [0x3, 0x5, 0x1, 0x7, 0x8, 0xffff, 0x200, 0x8]}, 0x5c) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x2}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:04 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000), 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffff9b, 0x4, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x31000, 0x0, 0x0, 0xd, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$nfs4(&(0x7f0000000400)='nfs4\x00', &(0x7f0000000440)='./file0\x00', 0x5, 0xa, &(0x7f0000001ac0)=[{&(0x7f0000001c80)="52001313cbe06f9511da2bd3a1bf7bd553299e063bc5991aba89b7b8aeec9116200d2774000718c49535baffece3647189a7596183ce435f4e3c2e6d02fd56517e050fc791967e3868ba9206c350606fd4f544278bb70dd29e79076a0d049caccfba9594ed87eea49ccf69207f93d5d36a3653075de3c6af8dc75167eee35f3a4283d86a8749eb2df2e0182d6f3ae7dfab0e2c4e83c78615b7f879645287b53d753504ee711d81b68d", 0x96, 0x17}, {&(0x7f0000000540)="6801f67adafa52d43a6d0f00eb3818ac4c47091b2d68c8d40c34ef1d4f906d1188084c3f2adb81ad5ba86e0927d45227965e3e2424c58ac6e1f4db6d296d74738f48056609bb336137afef619f27c893318e280154281f65d719769bf1d75f008310a54db91e464671211e61db50e5b7f99efdd234cb190704e967c6c283aa94099f0c05f5262797a21ea577ca7e2e115486552f60ad29cd72bbe0fae7b1f4a6c32a59a89c08969ef9085c510c716b96a7226809fa3eaccb", 0x6c9, 0x7}, {&(0x7f0000000600)="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", 0x1000, 0xfffffffffffff801}, {&(0x7f0000001600)="ba6c27dae29773231c04aeaf4b8af61afb166c5bdb41768f6253d1a192521c534ca270350d902e7b785e7d0d342cb14d5b62ebf601572544f402639284153d664ae08894c3d8531210b5d592400dbd84d56c1bc5c3862b07d90fdbaec846fb8bdb0e8e30abc1b6a276d84b41a1a08905e501db5b9f24d7946d2311e78586100f3897b10cfd3c838d8321215e75b7e9248c5bdf1360a646f974a89ebbc60713a719de0a3071c8cbc123c4b59278953d49b6706edfdae77a86f60d60072fdbc0385f8d31293e5ff8b7b9acad255699689dac66be8969505a6dce52b1db1555bc5fa4bbfa9459541be6774d6f5a2ba4783d89", 0xf1, 0x8}, {&(0x7f0000001700)="acb1ec691763254087d4100a9343ef89fe27726a1fcd57cf2275016c5f0b2445dd5d273fb876206abc02307ee863413d7b8a671c226f591d3e9fe1763d24d31bd78bf7", 0x43, 0x800000005}, {&(0x7f0000001780)="8358189ceb733f59afcf73998750d3d8effe768b6af6b2f5992f9fa8cd6628a29a333a86e4ea94e06fbe3ecec0fa508ef485b2146b252d9d82c406ecfe7cef20b9c3976c6f91f80bc7176b577372e40c3548cb4136ed72560062d4e4adb04dd8718441b364ff46aba64227eb7b9dfe", 0x6f, 0x101}, {&(0x7f0000001800)="4f820d1b57127beb8f122d2e7da11f2aa60712908dcbd8c9a16acd97a3b233eecd393a720f3306a55cad30661a78a3901ac5bea13008ac75260d6c72889d99897016b411970f53133fc69e9748761492b1a1bae1f3fbaac0132284d6f8c640099132840390e5e153cd611845269c81186f6bd7e11636d26b18e5d1e0c0b36bc34517743fb631c8a8a342d104934c92eefd7c68af314bcc4ec823a3d91796a982b5175e208a42bcfbb2d195e9ae86fa61a5e4ba96c2c97d94fe7575b015473e668102105a210d9dc1c40116e08fe384abaab7f1b73a5adeda17bb1abdb163935b9d4c2ca9bebe526d", 0xe8, 0x10001}, {&(0x7f0000001900)="41709268821d689e350b6dba3e0f21596e89227757ab8ca0c476a03cfc78c72af02397213d1457462f3704c3eac431112c8d23a0c5638ad69ea6502427d3544c42f024969c8fe6b9bd53775f8e20424ce1cdd24949e7b7a697d53734ab614f1be8acf15b4e80c2f219ae181e3e837499e17c7a1a5388dbea51817c8db272ee2fe8cceda03d4ca0dc36b173b3f5ee33f384c19341baf1ccff7139edc73800db1d70bbec7d40ae332cbe74204840fd7f5814df8df0b91fdd595b66926316bd1cedd4e5b5f0acb7be6812ddb92f8ce422a05d5adb007fccad12e7d8b6ed91d2a683a3716a7760ad7e3701", 0xe9, 0x9ba9}, {&(0x7f0000001a00)="71ca62332f580630f0bd432b11e6b4f99296416b17858b14063d3c7788e93ef99025b79cd8bcef584f1e7edf983d4a1dc7e59f1252d8e2c66a9afb8c30dd2213105dcd1ade9ba795bbf68c497d83019584d199d3a1e0dd3d977ed3b721269d", 0x5f, 0x94}, {&(0x7f0000001a80)="c78474cd496f47b8006d8f315bd8b094b0d228040403d63910d420482cb93e69297bac720946f31d2a46b7e9252fc1a03f27695adb20a6e3a8", 0x39, 0x2}], 0x1020, &(0x7f0000001bc0)='\\md5sum\x13vmnet1-selinux\x00') bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) delete_module(&(0x7f00000000c0)='\\md5sum\x13vmnet1-selinux\x00', 0x300) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0x96, "3ea4a4cbdd0839a29152fad43ecf9373d6bc880e52e321d897c935319164d64fe4d96e37624842006e46af96dd5e2e11904615d0c6579d423a1a887b42b5b27db90f0c79a324aeb8718c93f0569f1792c3d4301c7f030ee9b170ec33c6debd874f1da8ffb00568834cfb064a3d40082d3efa6d305e70ea0f210b183c59359b42b6da62cb141ae5e0126bd31ef976698bab496f7dda21"}, &(0x7f0000000280)=0x9e) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={r4, @in={{0x2, 0x4e20, @multicast2}}, 0x2, 0x81, 0xffffffff, 0x359, 0x20, 0x0, 0x80}, &(0x7f00000002c0)=0x9c) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r5, 0xc058534f, &(0x7f0000000100)={{0x1c, 0x8}, 0x0, 0x100, 0x0, {0x80, 0xd3}, 0xff, 0x3}) stat(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(0x0, r6, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0x0, 0x0, 0x0, 0x0, r6}}) r7 = getgid() fstat(r0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r6, r7, r8) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) 18:07:05 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r2, 0x200004) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r3, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r4}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:05 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:05 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x3}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1468.952672] audit: type=1804 audit(1577124425.497:4156): pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/459/file0/file0" dev="loop2" ino=1771 res=1 [ 1469.037569] device nr0 entered promiscuous mode 18:07:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1469.100051] device nr0 entered promiscuous mode 18:07:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x4}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:05 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1469.343922] device nr0 entered promiscuous mode 18:07:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0xa}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:06 executing program 5: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) r1 = shmat(r0, &(0x7f0000ff6000/0x4000)=nil, 0x0) shmat(r0, &(0x7f0000ff0000/0x4000)=nil, 0x7000) r2 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x60a342) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xffff, 0x520100) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, 0x0, 0x0, 0x81003) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$FICLONERANGE(r4, 0x4020940d, &(0x7f0000000180)={{r5}, 0x7, 0x7, 0xffffffff}) write$FUSE_BMAP(r3, &(0x7f0000000140)={0x18, 0x0, 0x6, {0x7ff}}, 0x18) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000400)={0x0, 0xffffffffffffff94, &(0x7f0000000380)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r9 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r9, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYRESDEC=r9, @ANYRES32=0x0, @ANYBLOB="0000000000000000200071095ddaefbf84ef65001400020008000100", @ANYRES32=r8, @ANYBLOB="080007007f000001"], 0x5}}, 0x0) connect$can_bcm(r2, &(0x7f0000000040)={0x1d, r8}, 0x10) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) timerfd_create(0x0, 0x400) shmdt(r1) [ 1469.581052] audit: type=1804 audit(1577124426.127:4157): pid=4528 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/460/file0/file0" dev="loop2" ino=1772 res=1 18:07:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000100)=0x30) r3 = socket$inet(0x2, 0x80001, 0x0) r4 = dup(r3) dup2(r4, r2) 18:07:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0xe}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x442900) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f00000000c0)={0x3, @bcast, r4}) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0xf}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:07 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:07 executing program 5: pipe(&(0x7f0000000680)) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) dup(0xffffffffffffffff) r1 = getpgrp(0x0) capget(&(0x7f0000000000)={0x0, r1}, 0x0) getpgid(0x0) r2 = memfd_create(0x0, 0x5) syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(0xffffffffffffffff, r2) ppoll(&(0x7f00000002c0), 0x131, &(0x7f0000000280)={0x77359400}, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r4, 0x10, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r5, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x1) r7 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) r9 = gettid() waitid(0x83b895581628fca4, r9, &(0x7f0000000040), 0x20000002, &(0x7f0000000480)) sendmsg$key(r7, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r8, @ANYRESDEC=r9]], 0xfffffffffffffe56}}, 0x20004850) memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r10 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r10) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x227d, &(0x7f0000000780)) kcmp(r10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740), 0xc) r11 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x30000, 0x18f) r12 = gettid() capget(&(0x7f00000002c0)={0x19980330, r12}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) perf_event_open(0x0, r13, 0xe, r11, 0x8) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xfffffffffffffffe) bind$inet(r14, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r14, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r14, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r15 = syz_open_dev$loop(&(0x7f00000001c0), 0x2, 0x244040) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r16 = memfd_create(&(0x7f0000000300)='\xdc!cpusetnodevtrustedusercpusetbdev\x00', 0x0) pwritev(r16, &(0x7f0000000400)=[{&(0x7f0000000580)="a34e3ae44a2cfa6185a43f5251b88e1391759ed695c05d8430e6049a4c9af22183e5553c", 0x1}], 0x0, 0x81001) ioctl$LOOP_CHANGE_FD(r15, 0x4c00, r16) sendfile(r14, r15, 0x0, 0x102000004) 18:07:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x60}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:07 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:07 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @empty, 0x0, 0x0, 'd\x00\x00\x03\x00\x04\x00\x00\x00\x06\x00\x00\xe8\xc3\x02\x00', 0x0, 0x2bfe1}, {@empty, 0x2}}, 0x24) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, &(0x7f0000000000)=0x1000) syz_mount_image$vfat(&(0x7f0000000100)='vfa\a\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x14, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'dummy0\x00', &(0x7f0000000100)=@ethtool_link_settings={0x23}}) r1 = socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x1, 0x4) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r3, 0x0, 0x20004850) r4 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x50) close(r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000240)={r4}) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, 0xffffffffffffffff) sendfile(r2, r5, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000180)={0x2, 'vlan0\x00', {0xfffffff7}, 0xfff9}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000140)=0x4) [ 1470.740712] device nr0 entered promiscuous mode 18:07:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, 0xffffffffffffffff) sendfile(r2, r3, 0x0, 0x0) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r4, 0x0, 0x0, 0x81003) r5 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r5, 0xffffffffffffffff) epoll_create(0x7) r6 = socket$inet(0x2, 0x0, 0x0) bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r7 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, 0xffffffffffffffff) sendfile(r6, r7, 0x0, 0x0) fchdir(r6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000280), 0x3}, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r9 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r9, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x6, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) r10 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x20600, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r10, 0xc0945662, &(0x7f0000000300)={0x4, 0x0, [], {0x0, @reserved}}) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) r11 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r11, 0x84, 0x3, &(0x7f00000000c0)=0x4, 0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r8, 0x29, 0x45, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) [ 1470.845504] device nr0 entered promiscuous mode 18:07:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1500}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8,\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) r5 = socket$inet6(0xa, 0x400000000803, 0x5f) r6 = open(&(0x7f0000000100)='./file1\x00', 0x14f642, 0x0) connect$rose(r3, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x40) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) 18:07:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0x2}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1471.518177] audit: type=1800 audit(1577124428.037:4158): pid=4643 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file1" dev="sda1" ino=17580 res=0 18:07:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) mkdirat$cgroup(r2, 0x0, 0x1ff) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r2, 0x80184132, &(0x7f0000000000)) ioctl$TCSETA(r1, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xfc5f}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x1a}) 18:07:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1500}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8,\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r4, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x660c, 0x0) r5 = socket$inet6(0xa, 0x400000000803, 0x5f) r6 = open(&(0x7f0000000100)='./file1\x00', 0x14f642, 0x0) connect$rose(r3, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x40) ftruncate(r6, 0x200004) sendfile(r5, r6, 0x0, 0x80001d00c0d0) 18:07:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r2 = socket(0xa, 0x0, 0x8) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) getpeername$llc(r2, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x10) sendmsg$key(r2, 0x0, 0x20004850) connect$x25(r2, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1c}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r3 = socket(0xa, 0x0, 0x8) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r3, 0x0, 0x20004850) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000002c0)="610b7b2c439da3dc67a408d7443ae3e18c0328e4914e92f67ad4a1bb8c5725942c", 0x21) r4 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x40000) syslog(0x0, &(0x7f0000000240)=""/103, 0x67) [ 1472.873250] audit: type=1800 audit(1577124429.327:4159): pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file1" dev="sda1" ino=16603 res=0 [ 1473.018686] audit: type=1400 audit(1577124429.567:4160): avc: denied { syslog } for pid=4768 comm="syz-executor.0" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 18:07:10 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:10 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x84) r1 = socket(0xa, 0x0, 0x8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r2 = socket(0xa, 0x0, 0x8) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r2, 0x0, 0x20004850) accept$ax25(r2, &(0x7f0000000440)={{0x3, @default}, [@netrom, @remote, @bcast, @default, @bcast, @bcast, @netrom, @rose]}, &(0x7f00000004c0)=0x48) sendmsg$key(r1, 0x0, 0x20004850) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x2, @mcast1, 0x9}, 0x1c) r3 = socket$inet(0x2, 0x0, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x105084) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, 0xffffffffffffffff) sendfile(r3, r4, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400000) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x8008551d, &(0x7f0000000540)=ANY=[@ANYBLOB="093451ec3f18f29c04210a0000140000000d8908040f0b8e85010f0304eafee4da4cf83a5266195f66b6e873f56f9278dcfe5166ca61598fc59b66189ca485df0b734a39ab637fd9967e21e1acd5a8efb3972a646e6d76825bc64bcfa54ca5c8f36761a83806b26b6843d71c438800c3a8e6769996404795887fcea3d3cfe6cf6740078b31c552551663aa03414b7d8d5e90e3dd567989518347db06930915b562e7895d6e5fd7a94363f3f4592b1331b474c2b9a20a3888f4509c7744b69b72ffbb41d36845c2c6bc3698e6981800000000"]) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000400)={'team0\x00'}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x38, @ipv4={[], [], @local}, 0x4}, 0x1c) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000002040200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000efffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009675bbcde881dd7ebba3a9134f58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000064d54b60f2462a907e6ad394612ecb54c2fda33be307acf3a4f996710abfd87de882cfcfef404217f1e56128e0ef34aa6874e01d8e81532902b8e16927022ac489debb08cbdd777b1757ae4b3ee5091ec7ebf0600000000000000ed0c746e71a25a551391a798556c557a5e1db32635652033bacdb2197982da264c563e34b34ba47c9b49cdc0074fd742720740e7007af02533803954f031bd38294ab280418a9455889a6ac9cb06e13242c0412c5c998848000dba5040e3304d791e770702e43915c8ebb9603eccc4bf265a8ddf4583aacb506754c0100e46f96b00"/781], 0x220) 18:07:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x200000, 0x0) accept4$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000180)=0x6e, 0x80800) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400000) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000040)) 18:07:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0x3}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:10 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) r2 = openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r5, 0x5404, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196a41cce6a3ff334", 0x68, 0x0) keyctl$get_keyring_id(0x0, r6, 0x1) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r9, @ANYBLOB="00000000e60000001c0012000c090100626f6e64000000000c00020008000100060000002ba3059064fec467698e6a04cd0339bebacc161fb323cf6a961b64426181eb52bd075fa93e41bf7237bcc74b6a2302539803c842cffea25caab9aaecf482a700add1a2bb173cd1381b31586b82d6a254472b939344448302a70fab"], 0x3c}}, 0x0) [ 1473.805641] audit: type=1400 audit(1577124430.357:4161): avc: denied { map } for pid=4801 comm="syz-executor.0" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=219540 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 18:07:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0x4}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1473.858364] device nr0 entered promiscuous mode [ 1473.919652] device nr0 entered promiscuous mode 18:07:10 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) ioctl$TIOCSTI(r2, 0x5412, 0xff) socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 18:07:10 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0xa}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1474.297545] audit: type=1804 audit(1577124430.847:4162): pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/463/file0/file0" dev="loop2" ino=1774 res=1 [ 1474.314980] ttyprintk ttyprintk: tty_port_close_start: tty->count = 1 port count = 3 [ 1474.333546] [ 1474.333552] ====================================================== [ 1474.333559] WARNING: possible circular locking dependency detected [ 1474.333563] 4.19.91-syzkaller #0 Not tainted [ 1474.333569] ------------------------------------------------------ [ 1474.333574] syz-executor.5/4842 is trying to acquire lock: [ 1474.333577] 00000000238cd3c8 (console_owner){-.-.}, at: vprintk_emit+0x3d5/0x6d0 [ 1474.333592] [ 1474.333603] but task is already holding lock: [ 1474.333606] 000000001ac44f0e (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x2b/0x570 [ 1474.333621] [ 1474.333626] which lock already depends on the new lock. [ 1474.333628] [ 1474.333630] [ 1474.333636] the existing dependency chain (in reverse order) is: [ 1474.333638] [ 1474.333640] -> #2 (&(&port->lock)->rlock){-.-.}: [ 1474.333655] _raw_spin_lock_irqsave+0x95/0xcd [ 1474.333659] tty_port_tty_get+0x22/0x90 [ 1474.333664] tty_port_default_wakeup+0x16/0x40 [ 1474.333668] tty_port_tty_wakeup+0x57/0x70 [ 1474.333672] uart_write_wakeup+0x46/0x70 [ 1474.333676] serial8250_tx_chars+0x495/0xaf0 [ 1474.333681] serial8250_handle_irq.part.0+0x261/0x2b0 [ 1474.333686] serial8250_default_handle_irq+0xc0/0x150 [ 1474.333690] serial8250_interrupt+0xfc/0x1e0 [ 1474.333695] __handle_irq_event_percpu+0x144/0x8f0 [ 1474.333699] handle_irq_event_percpu+0x74/0x160 [ 1474.333703] handle_irq_event+0xa7/0x134 [ 1474.333707] handle_edge_irq+0x25e/0x8d0 [ 1474.333711] handle_irq+0x39/0x50 [ 1474.333715] do_IRQ+0x99/0x1d0 [ 1474.333718] ret_from_intr+0x0/0x1e [ 1474.333722] native_safe_halt+0xe/0x10 [ 1474.333726] arch_cpu_idle+0xa/0x10 [ 1474.333729] default_idle_call+0x36/0x90 [ 1474.333732] do_idle+0x30c/0x4d0 [ 1474.333736] cpu_startup_entry+0xc8/0xe0 [ 1474.333740] start_secondary+0x3e8/0x5b0 [ 1474.333744] secondary_startup_64+0xa4/0xb0 [ 1474.333746] [ 1474.333748] -> #1 (&port_lock_key){-.-.}: [ 1474.333762] _raw_spin_lock_irqsave+0x95/0xcd [ 1474.333767] serial8250_console_write+0x7ca/0x9f0 [ 1474.333771] univ8250_console_write+0x5f/0x70 [ 1474.333776] console_unlock+0xbdf/0x10d0 18:07:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0xe}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1474.333780] vprintk_emit+0x280/0x6d0 [ 1474.333784] vprintk_default+0x28/0x30 [ 1474.333788] vprintk_func+0x7e/0x189 [ 1474.333791] printk+0xba/0xed [ 1474.333796] register_console+0x77f/0xb90 [ 1474.333801] univ8250_console_init+0x3e/0x4b [ 1474.333805] console_init+0x4f7/0x761 [ 1474.333809] start_kernel+0x59c/0x8c5 [ 1474.333814] x86_64_start_reservations+0x29/0x2b [ 1474.333819] x86_64_start_kernel+0x77/0x7b [ 1474.333823] secondary_startup_64+0xa4/0xb0 [ 1474.333825] [ 1474.333827] -> #0 (console_owner){-.-.}: [ 1474.333840] lock_acquire+0x16f/0x3f0 [ 1474.333844] vprintk_emit+0x412/0x6d0 [ 1474.333848] vprintk_default+0x28/0x30 [ 1474.333851] vprintk_func+0x7e/0x189 [ 1474.333855] printk+0xba/0xed [ 1474.333860] tty_port_close_start.part.0+0x51a/0x570 [ 1474.333864] tty_port_close+0x4e/0xf0 [ 1474.333867] tpk_close+0x83/0x95 [ 1474.333870] tty_release+0x3ba/0xe90 [ 1474.333874] __fput+0x2dd/0x8b0 [ 1474.333877] ____fput+0x16/0x20 [ 1474.333880] task_work_run+0x145/0x1c0 [ 1474.333885] exit_to_usermode_loop+0x273/0x2c0 [ 1474.333889] do_syscall_64+0x53d/0x620 [ 1474.333894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1474.333896] [ 1474.333901] other info that might help us debug this: [ 1474.333903] [ 1474.333906] Chain exists of: [ 1474.333908] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 1474.333923] [ 1474.333927] Possible unsafe locking scenario: [ 1474.333929] [ 1474.333933] CPU0 CPU1 [ 1474.333936] ---- ---- [ 1474.333938] lock(&(&port->lock)->rlock); [ 1474.333946] lock(&port_lock_key); [ 1474.333954] lock(&(&port->lock)->rlock); [ 1474.333961] lock(console_owner); [ 1474.333968] [ 1474.333971] *** DEADLOCK *** [ 1474.333972] [ 1474.333976] 2 locks held by syz-executor.5/4842: 18:07:11 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x400000) ioctl$TIOCSTI(r2, 0x5412, 0xff) socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) [ 1474.333978] #0: 0000000089f16cfa (&tty->legacy_mutex){+.+.}, at: tty_lock+0x73/0xb0 [ 1474.333991] #1: 000000001ac44f0e (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x2b/0x570 [ 1474.334005] [ 1474.334008] stack backtrace: [ 1474.334015] CPU: 1 PID: 4842 Comm: syz-executor.5 Not tainted 4.19.91-syzkaller #0 [ 1474.334023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1474.334026] Call Trace: [ 1474.334029] dump_stack+0x197/0x210 [ 1474.334035] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1474.334039] __lock_acquire+0x2e19/0x49c0 [ 1474.334043] ? mark_held_locks+0x100/0x100 [ 1474.334046] ? find_held_lock+0x35/0x130 [ 1474.334051] ? kvm_sched_clock_read+0x9/0x20 [ 1474.334054] ? vprintk_emit+0x3ed/0x6d0 [ 1474.334058] ? trace_hardirqs_off+0x62/0x220 [ 1474.334062] lock_acquire+0x16f/0x3f0 [ 1474.334066] ? vprintk_emit+0x3d5/0x6d0 [ 1474.334069] vprintk_emit+0x412/0x6d0 [ 1474.334072] ? vprintk_emit+0x3d5/0x6d0 [ 1474.334076] vprintk_default+0x28/0x30 [ 1474.334079] vprintk_func+0x7e/0x189 [ 1474.334082] printk+0xba/0xed [ 1474.334086] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1474.334090] ? kasan_check_write+0x14/0x20 [ 1474.334094] ? do_raw_spin_lock+0xc8/0x240 [ 1474.334098] tty_port_close_start.part.0+0x51a/0x570 [ 1474.334101] tty_port_close+0x4e/0xf0 [ 1474.334105] tpk_close+0x83/0x95 [ 1474.334109] ? tpk_write+0x340/0x340 [ 1474.334112] tty_release+0x3ba/0xe90 [ 1474.334116] ? ima_file_free+0xc9/0x4a0 [ 1474.334121] ? tty_release_struct+0x50/0x50 [ 1474.334124] __fput+0x2dd/0x8b0 [ 1474.334128] ____fput+0x16/0x20 [ 1474.334131] task_work_run+0x145/0x1c0 [ 1474.334135] exit_to_usermode_loop+0x273/0x2c0 [ 1474.334139] do_syscall_64+0x53d/0x620 [ 1474.334145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1474.334148] RIP: 0033:0x4144b1 [ 1474.334162] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1474.334167] RSP: 002b:00007ffde56411e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1474.334177] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 00000000004144b1 [ 1474.334184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 1474.334189] RBP: 0000000000000001 R08: 00000000e0030304 R09: ffffffffffffffff [ 1474.334195] R10: 00007ffde56412c0 R11: 0000000000000293 R12: 000000000075bf20 [ 1474.334202] R13: 0000000000167eda R14: 0000000000760888 R15: 000000000075bf2c [ 1474.401915] kobject: 'kvm' (00000000985e1ee5): kobject_uevent_env [ 1474.404880] net_ratelimit: 20 callbacks suppressed [ 1474.404887] protocol 88fb is buggy, dev hsr_slave_0 [ 1474.427817] kobject: 'kvm' (00000000985e1ee5): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1474.430657] protocol 88fb is buggy, dev hsr_slave_1 [ 1474.557839] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1475.057930] kobject: 'rx-0' (00000000243c9b07): kobject_cleanup, parent 0000000066e6e965 [ 1475.067202] kobject: 'rx-0' (00000000243c9b07): auto cleanup 'remove' event [ 1475.074712] kobject: 'rx-0' (00000000243c9b07): kobject_uevent_env [ 1475.081324] kobject: 'rx-0' (00000000243c9b07): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1475.089485] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' 18:07:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r2, 0x28, &(0x7f0000000040)}, 0xffffffffffffffdf) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x30100, 0x18) write$P9_RSYMLINK(r3, &(0x7f00000000c0)={0x14, 0x11, 0x1, {0x2, 0x1, 0x1}}, 0x14) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1475.096180] kobject: 'rx-0' (00000000243c9b07): auto cleanup kobject_del [ 1475.110415] kobject: 'rx-0' (00000000243c9b07): calling ktype release [ 1475.120548] kobject: 'rx-0': free name [ 1475.123955] kobject: 'loop5' (00000000506cb0b7): kobject_uevent_env [ 1475.126965] kobject: 'tx-0' (00000000fad345e9): kobject_cleanup, parent 0000000066e6e965 [ 1475.141990] kobject: 'loop5' (00000000506cb0b7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1475.149579] kobject: 'tx-0' (00000000fad345e9): auto cleanup 'remove' event [ 1475.158931] kobject: 'tx-0' (00000000fad345e9): kobject_uevent_env [ 1475.167455] kobject: 'tx-0' (00000000fad345e9): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1475.178169] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1475.181904] kobject: 'tx-0' (00000000fad345e9): auto cleanup kobject_del [ 1475.184958] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1475.193892] kobject: 'tx-0' (00000000fad345e9): calling ktype release [ 1475.215078] kobject: 'loop0' (000000007e6aa6bf): kobject_uevent_env [ 1475.217236] kobject: 'tx-0': free name [ 1475.221561] kobject: 'loop0' (000000007e6aa6bf): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1475.238296] kobject: 'queues' (0000000066e6e965): kobject_cleanup, parent (null) [ 1475.246925] kobject: 'queues' (0000000066e6e965): calling ktype release [ 1475.257612] kobject: 'queues' (0000000066e6e965): kset_release [ 1475.259192] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1475.264200] kobject: 'queues': free name [ 1475.270263] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1475.274980] kobject: 'nr0' (000000003ec5dcdf): kobject_uevent_env [ 1475.291438] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1475.301838] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1475.304501] kobject: 'nr0' (000000003ec5dcdf): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1475.341352] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1475.350633] audit: type=1804 audit(1577124431.897:4163): pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/464/file0/file0" dev="loop2" ino=1775 res=1 [ 1475.368769] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1475.425214] kobject: 'loop5' (00000000506cb0b7): kobject_uevent_env [ 1475.444694] kobject: 'loop5' (00000000506cb0b7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1475.503798] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1475.510292] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1475.525305] kobject: 'rx-0' (00000000154ce1ed): kobject_cleanup, parent 00000000ed269032 [ 1475.533835] kobject: 'rx-0' (00000000154ce1ed): auto cleanup 'remove' event [ 1475.541020] kobject: 'rx-0' (00000000154ce1ed): kobject_uevent_env [ 1475.547567] kobject: 'rx-0' (00000000154ce1ed): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1475.558060] kobject: 'rx-0' (00000000154ce1ed): auto cleanup kobject_del [ 1475.565156] kobject: 'rx-0' (00000000154ce1ed): calling ktype release [ 1475.571744] kobject: 'rx-0': free name [ 1475.576002] kobject: 'tx-0' (00000000178f9449): kobject_cleanup, parent 00000000ed269032 [ 1475.584325] kobject: 'tx-0' (00000000178f9449): auto cleanup 'remove' event [ 1475.591430] kobject: 'tx-0' (00000000178f9449): kobject_uevent_env [ 1475.597954] kobject: 'tx-0' (00000000178f9449): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1475.608686] kobject: 'tx-0' (00000000178f9449): auto cleanup kobject_del [ 1475.615643] kobject: 'tx-0' (00000000178f9449): calling ktype release [ 1475.622229] kobject: 'tx-0': free name [ 1475.626191] kobject: 'queues' (00000000ed269032): kobject_cleanup, parent (null) [ 1475.636714] kobject: 'queues' (00000000ed269032): calling ktype release [ 1475.643499] kobject: 'queues' (00000000ed269032): kset_release [ 1475.649477] kobject: 'queues': free name [ 1475.654330] kobject: 'nr0' (000000007bef3f6a): kobject_uevent_env [ 1475.660697] kobject: 'nr0' (000000007bef3f6a): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1475.670121] kobject: 'nr0' (000000003ec5dcdf): kobject_cleanup, parent (null) [ 1475.678504] kobject: 'nr0' (000000003ec5dcdf): calling ktype release [ 1475.685282] kobject: 'nr0': free name 18:07:12 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0xf}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) r2 = openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r5, 0x5404, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196a41cce6a3ff334", 0x68, 0x0) keyctl$get_keyring_id(0x0, r6, 0x1) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r9, @ANYBLOB="00000000e60000001c0012000c090100626f6e64000000000c00020008000100060000002ba3059064fec467698e6a04cd0339bebacc161fb323cf6a961b64426181eb52bd075fa93e41bf7237bcc74b6a2302539803c842cffea25caab9aaecf482a700add1a2bb173cd1381b31586b82d6a254472b939344448302a70fab"], 0x3c}}, 0x0) 18:07:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x2000)=nil) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) keyctl$invalidate(0x15, r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607149378d31f1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) shutdown(r0, 0x0) 18:07:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) r2 = socket(0xa, 0x0, 0x8) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r2, 0x0, 0x20004850) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000080)=0xf5ef1bdcaf779d93, 0x4) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:12 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r2, 0x200004) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r3, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r4}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1475.701815] kobject: 'loop3' (00000000bcb5ba44): kobject_uevent_env [ 1475.704721] kobject: 'nr0' (000000007bef3f6a): kobject_cleanup, parent (null) [ 1475.708398] kobject: 'loop3' (00000000bcb5ba44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1475.718850] kobject: 'nr0' (000000007bef3f6a): calling ktype release [ 1475.732949] kobject: 'nr0': free name 18:07:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0x60}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:12 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r2, 0x200004) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r3, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r4}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1475.790036] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1475.800105] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1475.825802] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1475.832349] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' 18:07:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0xf0}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1475.873464] kobject: 'nr0' (00000000cb66a4ab): kobject_add_internal: parent: 'net', set: 'devices' [ 1475.893543] kobject: 'loop3' (00000000bcb5ba44): kobject_uevent_env [ 1475.935343] kobject: 'loop3' (00000000bcb5ba44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1475.940372] kobject: 'nr0' (00000000cb66a4ab): kobject_uevent_env [ 1475.957291] kobject: 'kvm' (00000000985e1ee5): kobject_uevent_env [ 1475.971958] kobject: 'nr0' (00000000cb66a4ab): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1476.009461] kobject: 'kvm' (00000000985e1ee5): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1476.012114] kobject: 'queues' (000000000d1740b4): kobject_add_internal: parent: 'nr0', set: '' [ 1476.046403] kobject: 'queues' (000000000d1740b4): kobject_uevent_env 18:07:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x2000)=nil) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) keyctl$invalidate(0x15, r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607149378d31f1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) shutdown(r0, 0x0) [ 1476.058543] kobject: 'loop5' (00000000506cb0b7): kobject_uevent_env [ 1476.068916] kobject: 'loop5' (00000000506cb0b7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1476.070637] kobject: 'queues' (000000000d1740b4): kobject_uevent_env: filter function caused the event to drop! [ 1476.085078] kobject: 'kvm' (00000000985e1ee5): kobject_uevent_env [ 1476.093376] kobject: 'rx-0' (00000000d2326177): kobject_add_internal: parent: 'queues', set: 'queues' 18:07:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) r2 = openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r5, 0x5404, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196a41cce6a3ff334", 0x68, 0x0) keyctl$get_keyring_id(0x0, r6, 0x1) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r9, @ANYBLOB="00000000e60000001c0012000c090100626f6e64000000000c00020008000100060000002ba3059064fec467698e6a04cd0339bebacc161fb323cf6a961b64426181eb52bd075fa93e41bf7237bcc74b6a2302539803c842cffea25caab9aaecf482a700add1a2bb173cd1381b31586b82d6a254472b939344448302a70fab"], 0x3c}}, 0x0) [ 1476.101702] kobject: 'kvm' (00000000985e1ee5): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1476.113354] kobject: 'rx-0' (00000000d2326177): kobject_uevent_env [ 1476.120836] kobject: 'rx-0' (00000000d2326177): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1476.131450] kobject: 'tx-0' (00000000201fc558): kobject_add_internal: parent: 'queues', set: 'queues' [ 1476.141701] kobject: 'tx-0' (00000000201fc558): kobject_uevent_env [ 1476.149765] kobject: 'loop0' (000000007e6aa6bf): kobject_uevent_env [ 1476.153753] kobject: 'tx-0' (00000000201fc558): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1476.159924] kobject: 'loop0' (000000007e6aa6bf): fill_kobj_path: path = '/devices/virtual/block/loop0' 18:07:12 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r2, 0x200004) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r3, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r4}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000000180)={r5, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1476.186734] audit: type=1804 audit(1577124432.737:4164): pid=4913 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/465/file0/file0" dev="loop2" ino=1776 res=1 [ 1476.192943] device nr0 entered promiscuous mode [ 1476.275093] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1476.296773] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1476.314059] kobject: 'loop3' (00000000bcb5ba44): kobject_uevent_env [ 1476.320610] kobject: 'loop3' (00000000bcb5ba44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1476.331122] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1476.337218] kobject: 'kvm' (00000000985e1ee5): kobject_uevent_env [ 1476.342470] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1476.367632] kobject: 'loop5' (00000000506cb0b7): kobject_uevent_env [ 1476.368681] kobject: 'kvm' (00000000985e1ee5): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1476.380008] kobject: 'loop5' (00000000506cb0b7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1476.404975] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1476.422618] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1476.490690] kobject: 'kvm' (00000000985e1ee5): kobject_uevent_env [ 1476.509232] kobject: 'kvm' (00000000985e1ee5): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1476.535279] kobject: 'rx-0' (00000000d2326177): kobject_cleanup, parent 000000000d1740b4 [ 1476.545671] kobject: 'rx-0' (00000000d2326177): auto cleanup 'remove' event [ 1476.545871] kobject: 'loop0' (000000007e6aa6bf): kobject_uevent_env [ 1476.553186] kobject: 'rx-0' (00000000d2326177): kobject_uevent_env [ 1476.562775] kobject: 'loop0' (000000007e6aa6bf): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1476.568166] kobject: 'rx-0' (00000000d2326177): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1476.585818] kobject: 'rx-0' (00000000d2326177): auto cleanup kobject_del [ 1476.592739] kobject: 'rx-0' (00000000d2326177): calling ktype release [ 1476.599325] kobject: 'rx-0': free name [ 1476.603372] kobject: 'tx-0' (00000000201fc558): kobject_cleanup, parent 000000000d1740b4 [ 1476.611617] kobject: 'tx-0' (00000000201fc558): auto cleanup 'remove' event [ 1476.618766] kobject: 'tx-0' (00000000201fc558): kobject_uevent_env [ 1476.625186] kobject: 'tx-0' (00000000201fc558): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1476.632509] protocol 88fb is buggy, dev hsr_slave_0 [ 1476.635478] kobject: 'tx-0' (00000000201fc558): auto cleanup kobject_del [ 1476.640436] protocol 88fb is buggy, dev hsr_slave_1 [ 1476.647313] kobject: 'tx-0' (00000000201fc558): calling ktype release [ 1476.658884] kobject: 'tx-0': free name [ 1476.662833] kobject: 'queues' (000000000d1740b4): kobject_cleanup, parent (null) [ 1476.671232] kobject: 'queues' (000000000d1740b4): calling ktype release [ 1476.678037] kobject: 'queues' (000000000d1740b4): kset_release [ 1476.684049] kobject: 'queues': free name [ 1476.688330] kobject: 'nr0' (00000000cb66a4ab): kobject_uevent_env [ 1476.694710] kobject: 'nr0' (00000000cb66a4ab): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1476.714807] kobject: 'loop3' (00000000bcb5ba44): kobject_uevent_env [ 1476.721320] kobject: 'loop3' (00000000bcb5ba44): fill_kobj_path: path = '/devices/virtual/block/loop3' 18:07:13 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1476.742625] kobject: 'nr0' (00000000cb66a4ab): kobject_cleanup, parent (null) [ 1476.750893] kobject: 'nr0' (00000000cb66a4ab): calling ktype release [ 1476.757665] kobject: 'nr0': free name 18:07:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x20405, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0x300}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x2000)=nil) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) keyctl$invalidate(0x15, r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607149378d31f1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) shutdown(r0, 0x0) 18:07:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, &(0x7f0000000280)) r2 = openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000600)={'syz\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1b\x00', {}, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7ff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffafd63bfb]}, 0x45c) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000b47000/0x18000)=nil, 0x0, 0xffffff88, 0x0, 0x0, 0x3cf) socket(0x2, 0x0, 0xff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)) ioctl$TCSETSF(r5, 0x5404, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x7) socket$inet_udplite(0x2, 0x2, 0x88) keyctl$chown(0x4, 0x0, 0x0, 0x0) r6 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)="dc8924ac1e0bd2831d54aa46122941d67a93ca16c693c9d1f0113d6ffe49c6536fe07451fdd37f472ecaa8b9f9e10c938733c9b669ace8afd9dda16d5f8bcfb57b6bc1abe5770705e31137b3bb8e619ee9803b88fadc61da8619b9b8fb1ac19196a41cce6a3ff334", 0x68, 0x0) keyctl$get_keyring_id(0x0, r6, 0x1) socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r9, @ANYBLOB="00000000e60000001c0012000c090100626f6e64000000000c00020008000100060000002ba3059064fec467698e6a04cd0339bebacc161fb323cf6a961b64426181eb52bd075fa93e41bf7237bcc74b6a2302539803c842cffea25caab9aaecf482a700add1a2bb173cd1381b31586b82d6a254472b939344448302a70fab"], 0x3c}}, 0x0) 18:07:13 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1476.823259] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1476.825701] kobject: 'nr0' (000000005e7009ea): kobject_add_internal: parent: 'net', set: 'devices' [ 1476.838072] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1476.844558] kobject: 'nr0' (000000005e7009ea): kobject_uevent_env [ 1476.855417] kobject: 'nr0' (000000005e7009ea): fill_kobj_path: path = '/devices/virtual/net/nr0' 18:07:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0xa00}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1476.866521] kobject: 'queues' (0000000022629fbc): kobject_add_internal: parent: 'nr0', set: '' [ 1476.887554] kobject: 'queues' (0000000022629fbc): kobject_uevent_env [ 1476.910760] kobject: 'queues' (0000000022629fbc): kobject_uevent_env: filter function caused the event to drop! [ 1476.920364] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1476.935543] kobject: 'kvm' (00000000985e1ee5): kobject_uevent_env [ 1476.943368] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1476.982842] kobject: 'rx-0' (000000003bf5adae): kobject_add_internal: parent: 'queues', set: 'queues' [ 1477.000003] kobject: 'kvm' (00000000985e1ee5): fill_kobj_path: path = '/devices/virtual/misc/kvm' 18:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x2000)=nil) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) keyctl$invalidate(0x15, r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607149378d31f1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) shutdown(r0, 0x0) [ 1477.038617] kobject: 'rx-0' (000000003bf5adae): kobject_uevent_env [ 1477.045896] kobject: 'rx-0' (000000003bf5adae): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1477.056495] kobject: 'tx-0' (0000000004cdc47c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1477.066375] kobject: 'tx-0' (0000000004cdc47c): kobject_uevent_env [ 1477.073141] kobject: 'kvm' (00000000985e1ee5): kobject_uevent_env [ 1477.074850] kobject: 'loop5' (00000000506cb0b7): kobject_uevent_env [ 1477.080316] kobject: 'kvm' (00000000985e1ee5): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1477.089871] kobject: 'tx-0' (0000000004cdc47c): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1477.098816] kobject: 'loop5' (00000000506cb0b7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1477.106346] kobject: 'nr0' (000000001df26946): kobject_add_internal: parent: 'net', set: 'devices' [ 1477.131717] kobject: 'nr0' (000000001df26946): kobject_uevent_env 18:07:13 executing program 0: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1477.141627] kobject: 'nr0' (000000001df26946): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1477.155935] kobject: 'loop0' (000000007e6aa6bf): kobject_uevent_env [ 1477.159165] kobject: 'queues' (00000000282cf7a7): kobject_add_internal: parent: 'nr0', set: '' [ 1477.168612] kobject: 'loop0' (000000007e6aa6bf): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1477.189004] kobject: 'queues' (00000000282cf7a7): kobject_uevent_env [ 1477.202361] kobject: 'queues' (00000000282cf7a7): kobject_uevent_env: filter function caused the event to drop! [ 1477.225142] kobject: 'rx-0' (000000009ec26a1d): kobject_add_internal: parent: 'queues', set: 'queues' 18:07:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x2000)=nil) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) keyctl$invalidate(0x15, r3) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607149378d31f1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) [ 1477.237478] kobject: 'rx-0' (000000009ec26a1d): kobject_uevent_env [ 1477.244676] kobject: 'rx-0' (000000009ec26a1d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1477.256960] kobject: 'tx-0' (000000000b3808d6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1477.267089] kobject: 'tx-0' (000000000b3808d6): kobject_uevent_env [ 1477.273926] kobject: 'loop5' (00000000506cb0b7): kobject_uevent_env [ 1477.280415] kobject: 'loop5' (00000000506cb0b7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1477.284330] kobject: 'tx-0' (000000000b3808d6): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1477.312604] device nr0 entered promiscuous mode [ 1477.323014] device nr0 entered promiscuous mode 18:07:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0xe00}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1477.336190] kobject: 'nr0' (0000000016deb5d5): kobject_add_internal: parent: 'net', set: 'devices' [ 1477.345021] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1477.352490] protocol 88fb is buggy, dev hsr_slave_0 [ 1477.357593] protocol 88fb is buggy, dev hsr_slave_1 [ 1477.359241] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1477.362720] protocol 88fb is buggy, dev hsr_slave_0 [ 1477.377481] protocol 88fb is buggy, dev hsr_slave_1 [ 1477.382632] protocol 88fb is buggy, dev hsr_slave_0 [ 1477.387710] protocol 88fb is buggy, dev hsr_slave_1 [ 1477.394203] kobject: 'nr0' (0000000016deb5d5): kobject_uevent_env [ 1477.395309] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1477.400691] kobject: 'nr0' (0000000016deb5d5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1477.416982] kobject: 'queues' (00000000c787e67f): kobject_add_internal: parent: 'nr0', set: '' [ 1477.417204] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1477.426841] kobject: 'queues' (00000000c787e67f): kobject_uevent_env [ 1477.445136] kobject: 'queues' (00000000c787e67f): kobject_uevent_env: filter function caused the event to drop! [ 1477.455838] kobject: 'rx-0' (00000000730c12b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1477.467795] kobject: 'rx-0' (00000000730c12b5): kobject_uevent_env [ 1477.474514] kobject: 'rx-0' (00000000730c12b5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1477.486504] kobject: 'tx-0' (0000000081c56a34): kobject_add_internal: parent: 'queues', set: 'queues' [ 1477.496279] kobject: 'tx-0' (0000000081c56a34): kobject_uevent_env [ 1477.504245] kobject: 'tx-0' (0000000081c56a34): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1477.516372] device nr0 entered promiscuous mode [ 1477.595918] kobject: 'rx-0' (000000009ec26a1d): kobject_cleanup, parent 00000000282cf7a7 [ 1477.604445] kobject: 'rx-0' (000000009ec26a1d): auto cleanup 'remove' event [ 1477.611549] kobject: 'rx-0' (000000009ec26a1d): kobject_uevent_env [ 1477.618088] kobject: 'rx-0' (000000009ec26a1d): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1477.628379] kobject: 'rx-0' (000000009ec26a1d): auto cleanup kobject_del [ 1477.635767] kobject: 'rx-0' (000000009ec26a1d): calling ktype release [ 1477.643475] kobject: 'rx-0': free name [ 1477.647413] kobject: 'tx-0' (000000000b3808d6): kobject_cleanup, parent 00000000282cf7a7 [ 1477.655722] kobject: 'tx-0' (000000000b3808d6): auto cleanup 'remove' event [ 1477.662858] kobject: 'tx-0' (000000000b3808d6): kobject_uevent_env [ 1477.669552] kobject: 'tx-0' (000000000b3808d6): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1477.679895] kobject: 'tx-0' (000000000b3808d6): auto cleanup kobject_del [ 1477.686850] kobject: 'tx-0' (000000000b3808d6): calling ktype release [ 1477.693519] kobject: 'tx-0': free name [ 1477.697444] kobject: 'queues' (00000000282cf7a7): kobject_cleanup, parent (null) [ 1477.706028] kobject: 'queues' (00000000282cf7a7): calling ktype release [ 1477.712851] kobject: 'queues' (00000000282cf7a7): kset_release [ 1477.718823] kobject: 'queues': free name [ 1477.723212] kobject: 'nr0' (000000001df26946): kobject_uevent_env [ 1477.729561] kobject: 'nr0' (000000001df26946): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1477.808132] kobject: 'rx-0' (000000003bf5adae): kobject_cleanup, parent 0000000022629fbc [ 1477.816555] kobject: 'rx-0' (000000003bf5adae): auto cleanup 'remove' event [ 1477.823736] kobject: 'rx-0' (000000003bf5adae): kobject_uevent_env [ 1477.830255] kobject: 'rx-0' (000000003bf5adae): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1477.840545] kobject: 'rx-0' (000000003bf5adae): auto cleanup kobject_del [ 1477.847714] kobject: 'rx-0' (000000003bf5adae): calling ktype release [ 1477.854474] kobject: 'rx-0': free name [ 1477.858408] kobject: 'tx-0' (0000000004cdc47c): kobject_cleanup, parent 0000000022629fbc [ 1477.866717] kobject: 'tx-0' (0000000004cdc47c): auto cleanup 'remove' event [ 1477.873919] kobject: 'tx-0' (0000000004cdc47c): kobject_uevent_env [ 1477.881065] kobject: 'tx-0' (0000000004cdc47c): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1477.891307] kobject: 'tx-0' (0000000004cdc47c): auto cleanup kobject_del [ 1477.898477] kobject: 'tx-0' (0000000004cdc47c): calling ktype release 18:07:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x0, 0x8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000100)='./file0/file0\x00', 0x2000, 0x88) sendmsg$key(r1, 0x0, 0x20004850) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @remote}}, [0x2, 0x0, 0x6, 0x9, 0x100, 0x4, 0x9, 0x80000001, 0xff, 0x2, 0x6, 0xadab, 0x0, 0x400, 0x8]}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x4}, 0x8) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) mount(&(0x7f00000001c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='afs\x00', 0x200084, &(0x7f00000004c0)='md5sumprocselinux)*(\xca:\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1477.905089] kobject: 'tx-0': free name [ 1477.908994] kobject: 'queues' (0000000022629fbc): kobject_cleanup, parent (null) [ 1477.917917] kobject: 'queues' (0000000022629fbc): calling ktype release [ 1477.924737] kobject: 'queues' (0000000022629fbc): kset_release [ 1477.930734] kobject: 'queues': free name [ 1477.935123] kobject: 'nr0' (000000005e7009ea): kobject_uevent_env [ 1477.941471] kobject: 'nr0' (000000005e7009ea): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1478.034960] kobject: 'rx-0' (00000000730c12b5): kobject_cleanup, parent 00000000c787e67f [ 1478.043304] kobject: 'rx-0' (00000000730c12b5): auto cleanup 'remove' event [ 1478.051187] kobject: 'rx-0' (00000000730c12b5): kobject_uevent_env [ 1478.057770] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1478.059199] kobject: 'rx-0' (00000000730c12b5): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1478.064286] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1478.074531] kobject: 'rx-0' (00000000730c12b5): auto cleanup kobject_del [ 1478.091395] kobject: 'rx-0' (00000000730c12b5): calling ktype release [ 1478.098760] kobject: 'rx-0': free name [ 1478.105158] kobject: 'tx-0' (0000000081c56a34): kobject_cleanup, parent 00000000c787e67f [ 1478.115944] kobject: 'tx-0' (0000000081c56a34): auto cleanup 'remove' event [ 1478.126739] kobject: 'tx-0' (0000000081c56a34): kobject_uevent_env [ 1478.126996] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1478.133512] kobject: 'tx-0' (0000000081c56a34): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1478.139849] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1478.150359] kobject: 'tx-0' (0000000081c56a34): auto cleanup kobject_del [ 1478.166829] kobject: 'tx-0' (0000000081c56a34): calling ktype release [ 1478.171616] kobject: 'loop5' (00000000506cb0b7): kobject_uevent_env [ 1478.173819] kobject: 'tx-0': free name [ 1478.180242] kobject: 'loop5' (00000000506cb0b7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1478.184439] kobject: 'queues' (00000000c787e67f): kobject_cleanup, parent (null) [ 1478.202452] kobject: 'queues' (00000000c787e67f): calling ktype release [ 1478.209609] kobject: 'queues' (00000000c787e67f): kset_release [ 1478.217988] kobject: 'queues': free name [ 1478.223994] kobject: 'nr0' (0000000016deb5d5): kobject_uevent_env [ 1478.230455] kobject: 'nr0' (0000000016deb5d5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1478.243181] kobject: 'nr0' (000000001df26946): kobject_cleanup, parent (null) [ 1478.251518] kobject: 'nr0' (000000005e7009ea): kobject_cleanup, parent (null) [ 1478.267032] kobject: 'nr0' (000000001df26946): calling ktype release [ 1478.267695] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1478.274054] kobject: 'nr0': free name [ 1478.281386] kobject: 'nr0' (000000005e7009ea): calling ktype release [ 1478.285407] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1478.293670] kobject: 'nr0' (0000000016deb5d5): kobject_cleanup, parent (null) [ 1478.313893] kobject: 'nr0' (0000000016deb5d5): calling ktype release [ 1478.314036] kobject: 'nr0': free name [ 1478.320587] kobject: 'nr0': free name 18:07:14 executing program 4: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r4, 0x200004) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xc0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={r5, r6, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r7}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r4, 0x4010641c, &(0x7f0000000180)={r8, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r4, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) 18:07:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x2000)=nil) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) keyctl$invalidate(0x15, r3) syz_emit_ethernet(0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607149378d31f1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) 18:07:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0xf00}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:14 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={0xffffffffffffffff, 0xb0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000540)={0x5, 0x4, 0x8, 0x67}, &(0x7f0000000580)=0xc39, 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=0x1}}, 0x2da) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r4, 0x0, 0x7, &(0x7f0000000280)='nodev:\x00', r5}, 0x30) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000180)={r6, &(0x7f0000000140)=""/3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d00c0d0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/YbX:QW\x98>ctTl\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f00000001c0)=0x1aee) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8000, 0x153020) [ 1478.330379] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1478.343557] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1478.365121] kobject: 'loop3' (00000000bcb5ba44): kobject_uevent_env [ 1478.390141] audit: type=1804 audit(1577124434.937:4165): pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/467/file0/file0" dev="sda1" ino=17185 res=1 [ 1478.393506] kobject: 'loop3' (00000000bcb5ba44): fill_kobj_path: path = '/devices/virtual/block/loop3' 18:07:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x0, 0x8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000100)='./file0/file0\x00', 0x2000, 0x88) sendmsg$key(r1, 0x0, 0x20004850) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @remote}}, [0x2, 0x0, 0x6, 0x9, 0x100, 0x4, 0x9, 0x80000001, 0xff, 0x2, 0x6, 0xadab, 0x0, 0x400, 0x8]}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x4}, 0x8) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) mount(&(0x7f00000001c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='afs\x00', 0x200084, &(0x7f00000004c0)='md5sumprocselinux)*(\xca:\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1478.452738] kobject: 'nr0' (0000000071273bee): kobject_add_internal: parent: 'net', set: 'devices' [ 1478.478306] kobject: 'nr0' (0000000071273bee): kobject_uevent_env [ 1478.489558] kobject: 'nr0' (0000000071273bee): fill_kobj_path: path = '/devices/virtual/net/nr0' 18:07:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000080)=0xfffeffff, 0x4) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)=0x0) r4 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r4, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) r5 = socket$inet(0x2, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r6, 0x28, &(0x7f0000000040)}, 0xffffffffffffffdf) ioctl$VIDIOC_SUBDEV_S_FMT(r6, 0xc0585605, &(0x7f0000000240)={0x1, 0x0, {0x8, 0x0, 0x201b, 0x2, 0x6, 0x6, 0x0, 0x3}}) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r7 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x2, 0x20000) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, 0xffffffffffffffff) sendfile(r5, r7, 0x0, 0x0) kcmp(r3, r4, 0x4, r5, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0x13f1}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1478.508859] kobject: 'queues' (00000000cc26d024): kobject_add_internal: parent: 'nr0', set: '' [ 1478.520382] kobject: 'loop0' (000000007e6aa6bf): kobject_uevent_env [ 1478.532004] kobject: 'queues' (00000000cc26d024): kobject_uevent_env [ 1478.532104] kobject: 'loop0' (000000007e6aa6bf): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1478.540088] kobject: 'loop0' (000000007e6aa6bf): kobject_uevent_env [ 1478.561545] kobject: 'queues' (00000000cc26d024): kobject_uevent_env: filter function caused the event to drop! [ 1478.567147] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1478.577658] kobject: 'loop0' (000000007e6aa6bf): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1478.578868] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1478.594515] kobject: 'rx-0' (00000000cf552500): kobject_add_internal: parent: 'queues', set: 'queues' [ 1478.634244] kobject: 'rx-0' (00000000cf552500): kobject_uevent_env [ 1478.643086] kobject: 'rx-0' (00000000cf552500): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1478.644741] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1478.653608] kobject: 'tx-0' (00000000381c72e0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1478.666682] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1478.669584] kobject: 'tx-0' (00000000381c72e0): kobject_uevent_env [ 1478.685466] kobject: 'tx-0' (00000000381c72e0): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1478.697473] kobject: 'nr0' (00000000f8e08fa5): kobject_add_internal: parent: 'net', set: 'devices' [ 1478.724448] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1478.730146] kobject: 'nr0' (00000000f8e08fa5): kobject_uevent_env [ 1478.736922] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1478.739852] kobject: 'nr0' (00000000f8e08fa5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1478.759376] kobject: 'queues' (00000000e3098477): kobject_add_internal: parent: 'nr0', set: '' [ 1478.767695] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1478.775688] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1478.797018] kobject: 'queues' (00000000e3098477): kobject_uevent_env [ 1478.805005] kobject: 'queues' (00000000e3098477): kobject_uevent_env: filter function caused the event to drop! [ 1478.816083] kobject: 'rx-0' (000000006a3100a3): kobject_add_internal: parent: 'queues', set: 'queues' [ 1478.826203] kobject: 'rx-0' (000000006a3100a3): kobject_uevent_env [ 1478.838627] kobject: 'rx-0' (000000006a3100a3): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1478.849447] kobject: 'tx-0' (0000000026f21e18): kobject_add_internal: parent: 'queues', set: 'queues' [ 1478.859232] kobject: 'tx-0' (0000000026f21e18): kobject_uevent_env [ 1478.866420] kobject: 'tx-0' (0000000026f21e18): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1478.877436] device nr0 entered promiscuous mode [ 1478.888738] device nr0 entered promiscuous mode [ 1478.904249] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env [ 1478.910738] kobject: 'loop2' (0000000086cb4c13): fill_kobj_path: path = '/devices/virtual/block/loop2' 18:07:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0x3f00}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) 18:07:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x0, 0x8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000100)='./file0/file0\x00', 0x2000, 0x88) sendmsg$key(r1, 0x0, 0x20004850) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @remote}}, [0x2, 0x0, 0x6, 0x9, 0x100, 0x4, 0x9, 0x80000001, 0xff, 0x2, 0x6, 0xadab, 0x0, 0x400, 0x8]}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x4}, 0x8) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) mount(&(0x7f00000001c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='afs\x00', 0x200084, &(0x7f00000004c0)='md5sumprocselinux)*(\xca:\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) [ 1478.924848] audit: type=1804 audit(1577124435.477:4166): pid=5079 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir415319135/syzkaller.UvkSBI/468/file0/file0" dev="loop2" ino=1778 res=1 [ 1478.954352] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1478.976653] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1479.022593] kobject: 'loop0' (000000007e6aa6bf): kobject_uevent_env [ 1479.032510] kobject: 'loop0' (000000007e6aa6bf): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1479.070827] kobject: 'rx-0' (000000006a3100a3): kobject_cleanup, parent 00000000e3098477 [ 1479.079523] kobject: 'loop0' (000000007e6aa6bf): kobject_uevent_env [ 1479.086167] kobject: 'rx-0' (000000006a3100a3): auto cleanup 'remove' event [ 1479.086200] kobject: 'loop0' (000000007e6aa6bf): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1479.093991] kobject: 'rx-0' (000000006a3100a3): kobject_uevent_env [ 1479.111636] kobject: 'rx-0' (000000006a3100a3): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1479.124886] kobject: 'rx-0' (000000006a3100a3): auto cleanup kobject_del [ 1479.132669] kobject: 'rx-0' (000000006a3100a3): calling ktype release [ 1479.139786] kobject: 'rx-0': free name [ 1479.146332] kobject: 'tx-0' (0000000026f21e18): kobject_cleanup, parent 00000000e3098477 [ 1479.155144] kobject: 'tx-0' (0000000026f21e18): auto cleanup 'remove' event [ 1479.162867] kobject: 'tx-0' (0000000026f21e18): kobject_uevent_env 18:07:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x1}, 0x1c) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x2000)=nil) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff02000000000000000000000000000100004e20004d9078e29607149378d31f1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) [ 1479.169500] kobject: 'tx-0' (0000000026f21e18): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1479.180665] kobject: 'tx-0' (0000000026f21e18): auto cleanup kobject_del [ 1479.188386] kobject: 'tx-0' (0000000026f21e18): calling ktype release [ 1479.195555] kobject: 'tx-0': free name [ 1479.199608] kobject: 'queues' (00000000e3098477): kobject_cleanup, parent (null) [ 1479.210042] kobject: 'loop5' (00000000506cb0b7): kobject_uevent_env [ 1479.216609] kobject: 'queues' (00000000e3098477): calling ktype release [ 1479.222321] kobject: 'loop5' (00000000506cb0b7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1479.232269] kobject: 'queues' (00000000e3098477): kset_release [ 1479.239638] kobject: 'queues': free name [ 1479.245248] kobject: 'nr0' (00000000f8e08fa5): kobject_uevent_env [ 1479.257061] kobject: 'nr0' (00000000f8e08fa5): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1479.336509] kobject: 'rx-0' (00000000cf552500): kobject_cleanup, parent 00000000cc26d024 [ 1479.344813] kobject: 'rx-0' (00000000cf552500): auto cleanup 'remove' event [ 1479.351912] kobject: 'rx-0' (00000000cf552500): kobject_uevent_env [ 1479.359120] kobject: 'rx-0' (00000000cf552500): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/rx-0' [ 1479.369439] kobject: 'rx-0' (00000000cf552500): auto cleanup kobject_del [ 1479.376508] kobject: 'rx-0' (00000000cf552500): calling ktype release [ 1479.383146] kobject: 'rx-0': free name [ 1479.387119] kobject: 'tx-0' (00000000381c72e0): kobject_cleanup, parent 00000000cc26d024 [ 1479.395403] kobject: 'tx-0' (00000000381c72e0): auto cleanup 'remove' event [ 1479.402537] kobject: 'tx-0' (00000000381c72e0): kobject_uevent_env [ 1479.408898] kobject: 'tx-0' (00000000381c72e0): fill_kobj_path: path = '/devices/virtual/net/nr0/queues/tx-0' [ 1479.419141] kobject: 'tx-0' (00000000381c72e0): auto cleanup kobject_del [ 1479.426042] kobject: 'tx-0' (00000000381c72e0): calling ktype release [ 1479.432907] net_ratelimit: 8 callbacks suppressed [ 1479.432914] protocol 88fb is buggy, dev hsr_slave_0 [ 1479.432963] protocol 88fb is buggy, dev hsr_slave_1 [ 1479.433052] protocol 88fb is buggy, dev hsr_slave_0 [ 1479.433089] protocol 88fb is buggy, dev hsr_slave_1 [ 1479.433157] protocol 88fb is buggy, dev hsr_slave_0 [ 1479.433192] protocol 88fb is buggy, dev hsr_slave_1 [ 1479.469005] kobject: 'tx-0': free name [ 1479.472947] kobject: 'queues' (00000000cc26d024): kobject_cleanup, parent (null) 18:07:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0x4000}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1479.481391] kobject: 'queues' (00000000cc26d024): calling ktype release [ 1479.488176] kobject: 'queues' (00000000cc26d024): kset_release [ 1479.494212] kobject: 'queues': free name [ 1479.498527] kobject: 'nr0' (0000000071273bee): kobject_uevent_env [ 1479.504934] kobject: 'nr0' (0000000071273bee): fill_kobj_path: path = '/devices/virtual/net/nr0' [ 1479.522700] kobject: 'nr0' (00000000f8e08fa5): kobject_cleanup, parent (null) [ 1479.530981] kobject: 'nr0' (00000000f8e08fa5): calling ktype release 18:07:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x3c, r1, 0x1, 0x0, 0x0, {0x9, 0x0, 0x6000}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}]}, 0x3c}}, 0x0) [ 1479.538505] kobject: 'loop1' (00000000bcdd0320): kobject_uevent_env [ 1479.547763] kobject: 'loop1' (00000000bcdd0320): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1479.557428] kobject: 'nr0' (0000000071273bee): kobject_cleanup, parent (null) [ 1479.568902] kobject: 'nr0' (0000000071273bee): calling ktype release [ 1479.582516] kobject: 'nr0': free name [ 1479.595495] kobject: 'nr0': free name [ 1479.613701] kobject: 'loop3' (00000000bcb5ba44): kobject_uevent_env [ 1479.620206] kobject: 'loop3' (00000000bcb5ba44): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1479.633840] kobject: 'loop2' (0000000086cb4c13): kobject_uevent_env 18:07:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0xa, 0x0, 0x8) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$key(r2, 0x0, 0x20004850) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8983, &(0x7f0000000080)={0x7, '\x00', {0x20}, 0xaa}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x0, 0x8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000100)='./file0/file0\x00', 0x2000, 0x88) sendmsg$key(r1, 0x0, 0x20004850) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @remote}}, [0x2, 0x0, 0x6, 0x9, 0x100, 0x4, 0x9, 0x80000001, 0xff, 0x2, 0x6, 0xadab, 0x0, 0x400, 0x8]}, &(0x7f0000000080)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x4}, 0x8) openat$hwrng(0xffffffffffffff9c, 0x0, 0x4000, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0xc, 0x10001) socket$netlink(0x10, 0x3, 0x0) mount(&(0x7f00000001c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='afs\x00', 0x200084, &(0x7f00000004c0)='md5sumprocselinux)*(\xca:\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$inet6(0xa, 0x0, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') syz_genetlink_get_family_id$nbd(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='r\x80\x9fg\xe7\b\xf9H\x13O:i\xfck\x15>J:G\xea*\v\xd1\xa4\xa2\x15c\xda\x8a\x83.\xe4\xd9g\x11q\x86+\xd8\xb0GF\xd5\xec\xf7k]\xac\xd2\xec\x81\xc7|\xfe\t\xe0\xfb\xe7\x11p\xda\x91\x9a\xdc\x13,\x17P\xb8M6k\xcaNj\xdb\xc9\xe6|\x03\x03yZ\x9f\x96\xcb\xecQ\xe5\xb5\xc2\xb2(\xb5.\xdeo\xf96\xa1\xa7\xf2\x9c\xae\x18\xf3?=\xd7\xc34GM\xaa\x16\x8d\xf67\x06\xf3\xc4<\xf8\xbd\x9d\b\xbb\xa4\x9a*_2\x11\xf5K\x00\xd2\xa4\x195d[\xcb\xb7\xf6\xfb\xb2\xd9}s\xf6\xe2e\xafp\x1e^;\x9ec|UK6z\x93\x14q\xbdl\x00'/186, 0x26e1, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000040)) 18:07:16 executing program 3: ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{0x304}, "e611948ffa00da8c", "0ed92a34e7eb67a316ae332637e6cc80", "04267952", "e9957c05206701dd"}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f00000003c0)='./bus\x00', 0xccf82b8c3d0385e2, 0xc0) ftruncate(r3, 0x200004) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0