ntaining daemon:[ 34.210947] audit: type=1800 audit(1563904073.879:34): pid=6971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.686057] random: sshd: uninitialized urandom read (32 bytes read) [ 36.963655] audit: type=1400 audit(1563904076.659:35): avc: denied { map } for pid=7142 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 37.017662] random: sshd: uninitialized urandom read (32 bytes read) [ 37.667974] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.67' (ECDSA) to the list of known hosts. [ 43.151224] random: sshd: uninitialized urandom read (32 bytes read) 2019/07/23 17:48:03 fuzzer started [ 43.356257] audit: type=1400 audit(1563904083.049:36): avc: denied { map } for pid=7151 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 45.538592] random: cc1: uninitialized urandom read (8 bytes read) 2019/07/23 17:48:05 dialing manager at 10.128.0.105:39051 2019/07/23 17:48:06 syscalls: 2446 2019/07/23 17:48:06 code coverage: enabled 2019/07/23 17:48:06 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/07/23 17:48:06 extra coverage: extra coverage is not supported by the kernel 2019/07/23 17:48:06 setuid sandbox: enabled 2019/07/23 17:48:06 namespace sandbox: enabled 2019/07/23 17:48:06 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/23 17:48:06 fault injection: enabled 2019/07/23 17:48:06 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/23 17:48:06 net packet injection: enabled 2019/07/23 17:48:06 net device setup: enabled [ 47.411649] random: crng init done 17:50:02 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/net\x00') 17:50:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r2, 0x0, 0x3}) 17:50:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) fcntl$setownex(r0, 0xf, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 17:50:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0xff02, [0x0, 0x0, 0x40000010]}) 17:50:02 executing program 3: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_pts(0xffffffffffffffff, 0x202000) fstat(r0, &(0x7f00000002c0)) getuid() r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/psched\x00G\xaa\x01)/\x1f\xf5\xf48o\xae\xe9\xe9J\xac\xf4im\\\xb1\x1d\xed@\xa3\xeb\xc6\xff_oq\xeeL\xa2k\xf3\\A\x0e\xb6\xc8F\xd1v\v\x96\b\x8a\xb2M\x010\x88)r\x04Q\"\xba\'^\x1d\xe7\xbc-(\xb2F\'\x9b.\x04\xc2\xe8tRb\x1a\x8d\xbc\x88\xed\x9f\\\xd6\xfavx\r\x90`9\xbcVmG\xff\xedZ\x1c6\xe9\xa6\x86\x8d\xb8l\'\t\xe2\xc8\xb5|=\xcb\x05+}\x1ed/\xd1v\x05`\xc4\xecQ\xcc\x1d\xf4\xd3\x10\xe2\xdc\x16\xe4\xa7zO\xe9\xfc\x83g4\xc6\x18\x86T\x17\xd8\x8b\bO\x1f\xaaFf\x1f\xa4u\xc4H7\xe5)\xb6\f\xde\xa6\xa2\x9bT\x9a\xc7G\'\xa5x\xf8\x1d\xe8\x00K\xf1\xe0\x83h\xa7') sendfile(r1, r2, 0x0, 0x9) write$selinux_access(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB], 0x0) 17:50:02 executing program 4: openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000800)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) [ 163.135430] audit: type=1400 audit(1563904202.829:37): avc: denied { map } for pid=7151 comm="syz-fuzzer" path="/root/syzkaller-shm420026295" dev="sda1" ino=16491 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 163.167364] audit: type=1400 audit(1563904202.859:38): avc: denied { map } for pid=7168 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=25 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 164.050279] IPVS: ftp: loaded support on port[0] = 21 [ 164.379147] chnl_net:caif_netlink_parms(): no params data found [ 164.388653] IPVS: ftp: loaded support on port[0] = 21 [ 164.441804] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.448419] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.456254] device bridge_slave_0 entered promiscuous mode [ 164.465875] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.472761] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.479680] device bridge_slave_1 entered promiscuous mode [ 164.504250] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 164.513761] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.528842] IPVS: ftp: loaded support on port[0] = 21 [ 164.544243] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 164.552059] team0: Port device team_slave_0 added [ 164.560349] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 164.567516] team0: Port device team_slave_1 added [ 164.573018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 164.584116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 164.672141] device hsr_slave_0 entered promiscuous mode [ 164.710358] device hsr_slave_1 entered promiscuous mode [ 164.793333] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 164.812689] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 164.869449] chnl_net:caif_netlink_parms(): no params data found [ 164.893650] IPVS: ftp: loaded support on port[0] = 21 [ 164.911012] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.917473] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.924426] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.930946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.999718] chnl_net:caif_netlink_parms(): no params data found [ 165.033209] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.039905] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.047284] device bridge_slave_0 entered promiscuous mode [ 165.054345] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.060794] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.068079] device bridge_slave_1 entered promiscuous mode [ 165.110880] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.128161] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.158962] IPVS: ftp: loaded support on port[0] = 21 [ 165.165684] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 165.173643] team0: Port device team_slave_0 added [ 165.179201] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.185841] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.193916] device bridge_slave_0 entered promiscuous mode [ 165.201312] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.208540] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.215709] device bridge_slave_1 entered promiscuous mode [ 165.227538] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 165.234979] team0: Port device team_slave_1 added [ 165.243230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 165.250620] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 165.284571] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 165.312979] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 165.382154] device hsr_slave_0 entered promiscuous mode [ 165.440369] device hsr_slave_1 entered promiscuous mode [ 165.483274] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 165.542669] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.549870] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.558868] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 165.593551] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 165.601643] team0: Port device team_slave_0 added [ 165.607288] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 165.614781] team0: Port device team_slave_1 added [ 165.627909] IPVS: ftp: loaded support on port[0] = 21 [ 165.634686] chnl_net:caif_netlink_parms(): no params data found [ 165.646595] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 165.658053] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 165.683767] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 165.697894] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.740549] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 165.824792] device hsr_slave_0 entered promiscuous mode [ 165.870431] device hsr_slave_1 entered promiscuous mode [ 165.934836] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 165.945063] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 165.951718] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.961054] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.967422] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.974731] device bridge_slave_0 entered promiscuous mode [ 165.981306] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 165.987994] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.994468] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.001399] device bridge_slave_1 entered promiscuous mode [ 166.023600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.032246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.042585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 166.055640] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 166.077832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.086123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.094090] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.100515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.109853] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 166.138034] chnl_net:caif_netlink_parms(): no params data found [ 166.153641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.161993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.171020] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.177393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.186869] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 166.198121] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 166.209994] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 166.225878] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 166.233625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.248099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 166.291442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.302175] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 166.311731] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 166.318990] team0: Port device team_slave_0 added [ 166.333920] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 166.341560] team0: Port device team_slave_1 added [ 166.356709] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.363733] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.371926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.380090] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.389415] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 166.405358] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 166.413291] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 166.426458] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.435101] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.442463] device bridge_slave_0 entered promiscuous mode [ 166.449516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.459335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.508208] chnl_net:caif_netlink_parms(): no params data found [ 166.524640] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.532088] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.539066] device bridge_slave_1 entered promiscuous mode [ 166.561994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 166.584042] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 166.591874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.599503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.610375] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 166.625077] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 166.636227] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 166.693889] device hsr_slave_0 entered promiscuous mode [ 166.740409] device hsr_slave_1 entered promiscuous mode [ 166.781956] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 166.789855] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 166.796300] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.819485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.827824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.837413] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.844562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.854650] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 166.861089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.868386] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 166.885685] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 166.893041] team0: Port device team_slave_0 added [ 166.905926] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 166.913379] team0: Port device team_slave_1 added [ 166.918648] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 166.939843] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 166.950719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 166.959352] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 166.971356] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 166.985881] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 166.999192] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.007330] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.015058] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.021484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.028286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.036506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.044233] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.050615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.057854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.067994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 167.075552] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.084384] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.091514] device bridge_slave_0 entered promiscuous mode [ 167.098502] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.105149] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.112714] device bridge_slave_1 entered promiscuous mode [ 167.128664] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.145091] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 167.152231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.165753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 167.223850] device hsr_slave_0 entered promiscuous mode [ 167.260488] device hsr_slave_1 entered promiscuous mode [ 167.320730] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 167.329116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.347285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 167.356150] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 167.366112] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 167.374852] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 167.392548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.405856] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.414376] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.423960] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.452575] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 167.459591] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 167.467256] team0: Port device team_slave_0 added [ 167.476062] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 167.489125] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 167.501747] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 167.509133] team0: Port device team_slave_1 added [ 167.518783] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 167.527849] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 167.537319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.546565] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.564139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.569627] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 167.587335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:50:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_group_source_req(r1, 0x0, 0x17, 0x0, 0x0) [ 167.646272] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 167.658964] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 167.689711] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 167.697529] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.704670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.712631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.782412] device hsr_slave_0 entered promiscuous mode [ 167.820486] device hsr_slave_1 entered promiscuous mode [ 167.862957] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 167.872504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 167.879836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.888161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.895812] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.902219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.909114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.916983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.925574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.936764] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 167.946180] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 167.955845] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 167.963622] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.973337] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.981775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.989420] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.995824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.003544] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready 17:50:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x3a5, 0x8f0) [ 168.020902] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 168.033562] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 168.052776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.067666] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.078384] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 168.106612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 17:50:07 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$kcm(0x29, 0x200000000005, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xfff4) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 168.116699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.133592] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 168.152132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.171843] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 168.187838] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 168.212169] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 168.227124] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 168.227892] audit: type=1400 audit(1563904207.919:39): avc: denied { create } for pid=7219 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 168.238013] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 168.278449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.284953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.292183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.299169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.300330] protocol 88fb is buggy, dev hsr_slave_0 [ 168.306926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.311626] protocol 88fb is buggy, dev hsr_slave_1 [ 168.319313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.331173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.340685] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 168.348860] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 168.366291] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.376276] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 168.384008] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.393298] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.402879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.410925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.420823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 168.430189] protocol 88fb is buggy, dev hsr_slave_0 [ 168.435332] protocol 88fb is buggy, dev hsr_slave_1 [ 168.442694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 168.457378] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 168.465874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.474194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.482873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.490760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.498181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.507223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 17:50:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/9) userfaultfd(0x0) [ 168.515153] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.521573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.531160] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 168.537238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.552661] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 168.572140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 168.579685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.587892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.597522] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.608414] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.614808] bridge0: port 2(bridge_slave_1) entered forwarding state 17:50:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/\xffrt\x98\x95\x19\x1e]\xff\xea\x10\x1b\x1d\xcco\x8f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x5460, 0x7ffd6b4b7ffc) [ 168.629293] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 168.641767] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 168.650800] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 168.660631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 168.668554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 17:50:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(r1, &(0x7f00000000c0)='threaded\x00', 0xff29) fallocate(r1, 0x3, 0x8000, 0x7fff) fallocate(r1, 0x10, 0x0, 0xfff9) [ 168.684125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.702124] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.708528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.716618] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.723812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.732137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.740968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.748632] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.755062] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.765640] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.774663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.786690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 168.796116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 168.809932] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 168.817393] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.824525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 17:50:08 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000003dc0)={0x30, 0x3, 0x0, 0x3, 0x4, 0x1ca, 0x4, 0x1}, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x4c, 0x0, &(0x7f0000000340)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f00000001c0)={@flat=@weak_binder, @flat=@binder={0x73622a85, 0x0, 0x3}, @ptr={0x70742a85, 0x0, 0x0}}, &(0x7f0000000240)={0x0, 0x18, 0x30}}}], 0x0, 0x0, 0x0}) [ 168.835220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.849317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 168.863215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 168.876488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 17:50:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1, 0x20011, r2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000002000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 168.892173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.911000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.945950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.956437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.971659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.979112] audit: type=1400 audit(1563904208.669:40): avc: denied { map } for pid=7251 comm="syz-executor.5" path="/dev/sg0" dev="devtmpfs" ino=15196 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 [ 169.006046] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.012467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.023479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 169.034805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 169.052403] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 169.066100] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.073706] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.081329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.088951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.096912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.105630] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.116302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 169.133537] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.143798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 169.160728] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.167868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.176674] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.184516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.193050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.202361] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 169.222871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 169.231285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.239148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.249501] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.256004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.264671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.276022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 169.288681] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 169.301152] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 169.312594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.321498] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 169.329573] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 169.336822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.344441] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.353630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.361668] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.369111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.384121] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 169.396074] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 169.406443] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 169.419768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.429765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.438042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.446486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.456945] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 169.466923] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.474977] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.483111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.492607] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 169.498710] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.525199] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.536190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 169.564489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.577892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.598222] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 169.607996] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 169.617160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.627786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.645412] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.654926] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 169.661979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.692834] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 169.706553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.558148] audit: type=1400 audit(1563904210.249:41): avc: denied { map } for pid=7289 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 17:50:10 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x825, 0x0, 0x0, {{0x1, 0x0, 0x3f00}, 0x0, 0x400b, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 17:50:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") mq_unlink(&(0x7f00000002c0)='^keyring\x00') 17:50:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000200)={0x36, 0x0, 0x0, 0x3b, 0x0, 0x7fff, 0x0, 0x6a}) 17:50:10 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @empty=[0x3, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast=0xac14141f}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 17:50:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x825, 0x0, 0x0, {{0x1, 0x0, 0x3f00}, 0x0, 0x410c, 0x0, {0xebc, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 17:50:10 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:10 executing program 3: connect$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000200)={0x36, 0x0, 0x0, 0x3b, 0x0, 0x7fff, 0x0, 0x6a}) [ 170.982989] audit: type=1400 audit(1563904210.679:42): avc: denied { create } for pid=7299 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 171.017670] hrtimer: interrupt took 41114 ns 17:50:10 executing program 0: socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000180), 0x4) r0 = socket$kcm(0x10, 0x40000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003180)={&(0x7f0000003040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfe3d, &(0x7f0000003100), 0x0, &(0x7f0000003140)=""/29, 0x1d}, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001300)={0xffffffffffffffff, &(0x7f00000011c0)="e03021b3ab5402b5ccbfb2545c522a6b2e7a83c8fb152651fd2755ffe198f22a2df9f0b726f11fd71ace48781036fa571fb0f12d7c013faa6a621db0cc1beea9d136024d6d88d3150af0a3a7ba1f40bc41dcc351fea7b521ba378a79e06128ca242991ffe094478b2b4842700d", 0x0}, 0x18) recvmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000200)=@sco, 0x26c, &(0x7f0000002b80), 0x218, &(0x7f00000076c0)=""/156, 0xfffffffffffffe11, 0xfffffffffffffffa}, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x7, 0x4) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x400300, 0x0, 0x0, 0x0, 0x0, 0x287d000000000000}, 0x40) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:50:10 executing program 5: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x100000488) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:50:10 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/group.\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xde\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xff\xff\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00>\xdc\xcbzg\x95\x18\x11\xa6\xf0\xba\x1e\xcb\xaf\xa1\x87\xd6bFU_\xeb\xb0\xe3^\n\x1a7\xc0\xa3\xc2\x1a\x9d\xf0\x94\xa3\xb7\x17Vk\xe1\r\x18\xba\n\x84\xf65\vH\xcbu\x13\xcb&\x1e.(\xb6Cc\xd8\xac]\xf4\xfa\xe2CWv\x03\x92?\xf83\x8aN\xc6\x8b\xec\xc1\x88/\xb1\x0f\xeb\aW\xe2\xdc)\x92\xd0\x10\xac\xee\xf6\xa4\xf4Q\xf9-\xa9)\x8cX\x96\x12\xfahz\xcbn\xb3\x92\x03\xfc\x0f\xa7Ew\xacJ:\x04\xf3\x98\x0ev#', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) socket$kcm(0x29, 0x200000000005, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000040)=r0, 0xfff4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 17:50:10 executing program 2: geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 171.074882] audit: type=1400 audit(1563904210.709:43): avc: denied { write } for pid=7301 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 17:50:10 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f00000014c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) [ 171.154250] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:10 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') [ 171.230541] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:11 executing program 3: r0 = socket(0x200000000000011, 0x80000000000003, 0x0) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 171.264797] audit: type=1400 audit(1563904210.709:44): avc: denied { read } for pid=7301 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 171.270632] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_group_source_req(r1, 0x0, 0x22, 0x0, 0x0) [ 171.314164] audit: type=1400 audit(1563904210.869:45): avc: denied { map } for pid=7322 comm="syz-executor.5" path="/root/syzkaller-testdir162376338/syzkaller.jNv0eX/9/bus" dev="sda1" ino=16551 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 171.359693] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.0'. [ 171.368755] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:50:11 executing program 2: sched_getattr(0x0, &(0x7f00000048c0)={0x30}, 0x30, 0x0) 17:50:11 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:11 executing program 3: clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="8cff7cf908000000"], 0x8) 17:50:11 executing program 0: syz_open_dev$dri(0x0, 0x0, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000200)) [ 171.665902] SELinux: truncated policydb string identifier [ 171.690834] SELinux: failed to load policy 17:50:11 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffff1, &(0x7f00000001c0)=0xd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') keyctl$set_timeout(0xf, 0x0, 0x0) getdents(r0, &(0x7f0000002480)=""/4096, 0x12fe) 17:50:11 executing program 2: seccomp(0x1, 0x1, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) seccomp(0x1, 0x1, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) 17:50:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:50:11 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:11 executing program 3: semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/146) 17:50:11 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) [ 171.790388] audit: type=1400 audit(1563904211.479:46): avc: denied { map } for pid=7322 comm="syz-executor.5" path="socket:[27351]" dev="sockfs" ino=27351 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=udp_socket permissive=1 17:50:11 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002200000016000000080000009500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 17:50:11 executing program 3: 17:50:11 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:11 executing program 2: 17:50:11 executing program 4: 17:50:11 executing program 5: 17:50:11 executing program 3: 17:50:11 executing program 2: 17:50:11 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:11 executing program 4: 17:50:11 executing program 2: 17:50:12 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) 17:50:12 executing program 3: 17:50:12 executing program 5: 17:50:12 executing program 4: 17:50:12 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:12 executing program 2: 17:50:12 executing program 3: 17:50:12 executing program 2: 17:50:12 executing program 5: 17:50:12 executing program 4: 17:50:12 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:12 executing program 2: 17:50:12 executing program 4: 17:50:12 executing program 3: 17:50:12 executing program 5: 17:50:12 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:12 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) 17:50:12 executing program 2: 17:50:13 executing program 4: 17:50:13 executing program 3: 17:50:13 executing program 2: 17:50:13 executing program 5: 17:50:13 executing program 1: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:13 executing program 4: 17:50:13 executing program 2: 17:50:13 executing program 3: 17:50:13 executing program 5: 17:50:13 executing program 4: 17:50:13 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) 17:50:13 executing program 1: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:13 executing program 2: 17:50:13 executing program 3: 17:50:13 executing program 5: 17:50:13 executing program 4: 17:50:13 executing program 4: 17:50:13 executing program 5: 17:50:13 executing program 3: 17:50:13 executing program 1: mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:13 executing program 2: 17:50:13 executing program 4: 17:50:13 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) 17:50:13 executing program 5: 17:50:13 executing program 3: 17:50:13 executing program 2: 17:50:13 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:13 executing program 4: 17:50:14 executing program 4: 17:50:14 executing program 3: 17:50:14 executing program 2: 17:50:14 executing program 5: 17:50:14 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:14 executing program 4: 17:50:14 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) 17:50:14 executing program 2: 17:50:14 executing program 5: 17:50:14 executing program 3: 17:50:14 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:14 executing program 4: 17:50:14 executing program 5: 17:50:14 executing program 4: 17:50:14 executing program 3: 17:50:14 executing program 2: 17:50:14 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:14 executing program 3: 17:50:15 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r1, 0x0, &(0x7f00000003c0)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) 17:50:15 executing program 4: 17:50:15 executing program 5: 17:50:15 executing program 2: 17:50:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:15 executing program 3: 17:50:15 executing program 2: 17:50:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:15 executing program 5: 17:50:15 executing program 4: 17:50:15 executing program 3: 17:50:15 executing program 2: 17:50:15 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r2, 0x825, 0x0, 0x0, {{0x1, 0x0, 0x3f00}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 17:50:15 executing program 3: 17:50:15 executing program 5: 17:50:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x825, 0x0, 0x0, {{0x1, 0x0, 0x3f00}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x02'}}}, 0x30}}, 0x0) 17:50:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000040)={0x7b, 0xff02, [0x11e, 0x0, 0x40000010]}) 17:50:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip_mr_cache\x00') sendfile(r0, r1, 0x0, 0xfffc) 17:50:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\xe3\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\x00\x87\xac\xad\x80\xa3P\x8c\xea\x17f%;\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80\x1d\x95WM\x9a\xc6\x95\x98\xed\xe9\xca\x9e\xe6\xcb\x8e\xef\xf659-\xef\xb5\xc9\xf2\"\x15\xb39T\x81\x19\xcc\xcd\xb5\r\x10G\x16(~\x15\xd1\xde\x9e\xb1s\xa0\x864hb\xaa\xa3\x18V\x17xE\xbd\xc2QD\xa5P\x0f\x8e\x1f\x888\xb6\xee\xc6N\xd2\x136\xeb\xa4\x1d\xaap\xc6\x9e\xdc\x007h\f\x96g\"_\xb1\x1b\xdb\x86\xc6\xc9\xb1\xcc\xa1\x9f\xd8h\xcc\x12\xf1k\xe8\x86:D\xd2\xd1\x02I\xfe\x96t\xe5C\x86)\xf0M\xc4\xa35\xcc\x9b\x9e\xbb5\x18[\x958D\\~3\xcaO\x97M\xaf\x930\xfd\x13\xa3\xde\xce0\x1d5I\xba\xc5;T\xdc\xaf\xc8\xa6\n\x92\x0e6>\x19*') openat$cgroup_ro(r0, &(0x7f0000000780)='mem\x00rrenu\x002\x00\x00\x00\x00\x00\xee\x14[\xdf}I1g\v\xa4\xbd\xa7\x95\x12\x15\xf1KWQ\xae\a\xc8)v4\"\xa2qk\xc3\x9d\xf5\x9d\xc1r\xaf\xbc\xc46\xbc\xf2\x92@\xe9t\x01\xccJ\x7f\x19C>s\xecR&\fF^\xe0\x1d\x94\x80K\xfa\xa2\x16\xe74T\xb4\xb1\x13A\xbf6\x18\x9eb\x80rM\x0f\x9f\x18U\xf7\x1b\xee\xa8\xd1\x1c\n\xe8\xda\x96;\x1d\xa1\x11\x1a\x9aLX\xca\xd4\x1c\x1cc$\xb9\x98}\xf7\xb2\x1d\x13=6e!<\xe9s\xf4\xb1\x8b\x81,\xb7\xb5Z\x1d:\xc3t\xb9\xd5.O|\x95\x8e\xc4\x7f\xbaj\xda\x03KO\x82\xbb\xe3\x1d\xcf\xd7J\x81J@\xe0\xf5\xd4 A\xc5$\xc4U\xc29\x94\x9e\xac\x92i0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x7fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',debug=']) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400, 0x0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f00000000c0)=[0x4, 0xd8b]) 17:50:16 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000340)={0x1, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000b80)={0x2, r3, 0x10000000, 0xc9}) close(r1) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x100000000004e21, 0x0, @loopback}, 0x1c) r5 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x8, 0x88000) ioctl$EVIOCGRAB(r5, 0x40044590, &(0x7f00000002c0)=0x2) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x1) r6 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x7d, 0x4000) ioctl$VIDIOC_S_DV_TIMINGS(r6, 0xc0845657, &(0x7f00000000c0)={0x0, @reserved}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000380)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r7 = dup3(r0, r4, 0x80000) getsockopt$inet_sctp_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000480)={0x0, 0x4, 0x2, 0x7}, &(0x7f00000004c0)=0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r7, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={r8, 0x9}, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, 0x0, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000b40)={0xa, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) ftruncate(r9, 0x200004) sendfile(r1, r9, 0x0, 0x80001d00c0d0) ioctl$VIDIOC_ENUMINPUT(r6, 0xc050561a, &(0x7f0000000200)={0x4, "e0483d7578d4f89f96e97787143d6e4cb86c8cbe6bde718e683b2459cc735efb", 0x0, 0x4, 0x2, 0x4, 0x4000000, 0x4}) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000400)={[0x6000, 0x1, 0x3000, 0xf002], 0xe1, 0x20, 0x5}) 17:50:16 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='tmpfs\x00\x80\n\x0f\xa0\'\x87\x9e\xee\xde.$^\x19\x15\xb8.\x19\x1c\xae\xf6\xbf\x9c\xda~\xf7\xb4lE\x82j\x00\x88\xfb_\xab\xf8\x9c\x1f\xc59\xd4\xb5\xd9\x19', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') getcwd(&(0x7f0000000100)=""/143, 0x8f) 17:50:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x6, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000180)={0x7, 0x1, 0x7, 0x5, 0x7, 0x80000000}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 17:50:16 executing program 2: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') [ 176.669722] 9pnet: Insufficient options for proto=fd 17:50:16 executing program 3: getpgrp(0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40040, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240)={0x9ce, 0xfffffffffffffffb, 0x80, 0x26f}, 0x8) getsockopt(r0, 0x6, 0x6, &(0x7f0000000080)=""/49, &(0x7f00000000c0)=0x31) gettid() rt_sigprocmask(0x0, &(0x7f0000000100)={0xfffffffffffffffe}, 0x0, 0x8) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000002d40), 0x8, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000001c0)=r0, 0x4) accept4$alg(r1, 0x0, 0x0, 0x800) read(r1, &(0x7f0000000140)=""/128, 0x80) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x4000, 0x0) signalfd(r1, &(0x7f0000000000)={0x3}, 0x8) signalfd4(r1, &(0x7f0000a71ff8)={0x62}, 0x8, 0x0) [ 176.718422] 9pnet: Insufficient options for proto=fd 17:50:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:16 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 17:50:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000)='@', &(0x7f0000000180)}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001640)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet6_buf(r3, 0x29, 0x2c, &(0x7f0000000440)=""/4096, &(0x7f0000000180)=0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000440), &(0x7f0000000200)}, 0x12e) r4 = shmget(0x0, 0x4000, 0x80a, &(0x7f0000ff9000/0x4000)=nil) getresuid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000001440)) fstat(r1, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() r8 = getegid() r9 = gettid() ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001500)=0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000001540)={{0xffffffff, r5, r6, r7, r8, 0x82, 0x8}, 0x4, 0x0, 0x762e, 0x3, r9, r10, 0x7}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000200)="19", &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) accept$nfc_llcp(r3, &(0x7f0000000300), &(0x7f0000000240)=0x60) 17:50:17 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 17:50:17 executing program 5: prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x5, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 17:50:17 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x6, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x400000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000180)={0x7, 0x1, 0x7, 0x5, 0x7, 0x80000000}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 17:50:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') 17:50:17 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bind$vsock_dgram(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10) ioctl$EVIOCSCLOCKID(r0, 0x40084504, &(0x7f0000ffcffc)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000000c0)={[{0x9, 0x2, 0x1, 0x4, 0xffffffff, 0xfffffffffffffc01, 0xffffffff, 0x3, 0x9, 0x9, 0x635, 0xfffffffffffffffb}, {0x6, 0x7, 0xfff, 0x100000000, 0x9, 0x1116feef, 0x7, 0x0, 0x4, 0xffffffff, 0x2, 0x0, 0xff}, {0x3f27, 0x0, 0x7, 0x800, 0xe24e, 0x9, 0x200, 0x200, 0xff, 0x0, 0x4, 0x1000, 0x49}], 0x7ff}) 17:50:17 executing program 2: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', 0x0) 17:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 17:50:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x4, 0x4, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x2}}, [0x101, 0x9, 0xffffffffffff7fff, 0x5, 0x6, 0x2, 0x4, 0x7f, 0x9, 0x401, 0xc1, 0x3f, 0x7, 0x8, 0x2d]}, &(0x7f0000000040)=0x100) ioctl(r0, 0x8, &(0x7f0000000300)="ff5df106b3d566f4b5f90d17aeb29e3b61e2a5f826fc49478fcceede49588882402b80afcc8c5ac498d61125b9f2af9716751886faf9b21305df118bdaf15416706e18f208056f666f989fcb7045269aef954d40565a2d70dfcc47fc821d29382afdd705d01503719a7707f502fadbee95841a5ea4a0b8141e4082ba0e64a9eadf9274c4d1462e80baf5727106b8d8c9a74fb6f20f7612e452f6fa08f5f4f67814") getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r3, 0x8}, &(0x7f00000000c0)=0x8) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000280)={{0x2, 0x4e23, @remote}, {0x1, @broadcast}, 0x20, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, 'veth1_to_hsr\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0xc09, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ipip={{0xc, 0x1, 'ipip\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x3}]]}}}]}, 0x3c}}, 0x0) 17:50:17 executing program 5: pipe2(&(0x7f0000000000), 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x14, 0x3e, 0x105, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 17:50:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', 0x0) 17:50:18 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:18 executing program 3: r0 = socket$inet6(0xa, 0x100000000000005, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000010c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, 0x0) getsockopt$bt_hci(r0, 0x84, 0x1f, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9e000000000, 0x400) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001100)={'nlmon0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)=@getqdisc={0x4c, 0x26, 0x100, 0x70bd25, 0x25dfdbfc, {0x0, r2, {0x2, 0xffe0}, {0x4, 0xf}, {0xfff1}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40044}, 0x4000804) 17:50:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) read(r0, &(0x7f0000000180)=""/132, 0x84) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) accept4(r0, &(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000000)=0x80, 0x80000) fcntl$setstatus(r2, 0x4, 0x800) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 17:50:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/302], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xfd13, &(0x7f0000000000)=""/195}, 0x48) 17:50:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', 0x0) 17:50:18 executing program 3: r0 = socket$inet6(0xa, 0x100000000000005, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000010c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, 0x0) getsockopt$bt_hci(r0, 0x84, 0x1f, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9e000000000, 0x400) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001100)={'nlmon0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001140)=@getqdisc={0x4c, 0x26, 0x100, 0x70bd25, 0x25dfdbfc, {0x0, r2, {0x2, 0xffe0}, {0x4, 0xf}, {0xfff1}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40044}, 0x4000804) 17:50:18 executing program 2: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:18 executing program 1 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:18 executing program 4: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r0 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(r0) r2 = memfd_create(&(0x7f0000000340)='\x1f\xdb\x8a\xabF\xf8\xc0\xc18n4\xc88v\xaf/\x1e\v\x9a\xf6xw\xf1\x95\xdc\xba\xf9\v?\xcc\xe6hJ\a\xcdyj\x1a\xca\f\xa08\xbd$B\xff\x10\x1a\x7f\xc53\x1c\xa3\xe4\xdb\x7f!B\xe20\x91\x19\xaeX\xd1*HJ \xc9f\x9e~y\xa2\xde\xde\xd0\x16 %3~\xbf\xb7\x8d0\x15\xaf\x95\xa3mJY\xb4\x97\t\xa4\xd5\xe0\x15\x88\xf6\xed\xa2Cf_\xaf/\x17\x8d*[V\xfd\x98\xb1\xf5\x91\x1bN', 0x7) write$FUSE_DIRENT(r2, &(0x7f0000000080)=ANY=[], 0x29) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000100)=0x1e) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r2, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ftruncate(r0, 0x5) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x0) 17:50:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) recvfrom$rose(r2, &(0x7f00000003c0)=""/4096, 0x1000, 0x10000, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @default}, 0x1c) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r3, 0x1, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 17:50:18 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x1ff, 0x4) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000100)={0x858, 0x2, [0x1, 0x44, 0x855, 0x80000001, 0x80], 0x5}) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000080)="ae70b14f184ea8e07f01a4eb2a30ec5cba7dd49495418b58ca2be748949c9f95e69b12258bbe8599ac6c68b6") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sync_file_range(r1, 0x0, 0x7, 0x1) sendmsg$nl_xfrm(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000700)=@acquire={0x178, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in=@dev, {@in=@local, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote, 0x0, 0x32}, 0x0, @in6}]}, @mark={0xc, 0x15, {0x0, 0xfffffffffffffffe}}]}, 0x178}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) [ 179.130760] [ 179.132430] FAULT_INJECTION: forcing a failure. [ 179.132430] name failslab, interval 1, probability 0, space 0, times 1 [ 179.139389] ============================= [ 179.196186] WARNING: suspicious RCU usage [ 179.197202] CPU: 0 PID: 7766 Comm: syz-executor.1 Not tainted 4.14.134 #29 [ 179.207418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.217504] Call Trace: [ 179.220104] dump_stack+0x138/0x19c [ 179.220513] 4.14.134 #29 Not tainted [ 179.223744] should_fail.cold+0x10f/0x159 [ 179.223761] should_failslab+0xdb/0x130 [ 179.223775] kmem_cache_alloc+0x2d7/0x780 [ 179.223792] getname_flags+0xcb/0x580 [ 179.223809] user_path_at_empty+0x2f/0x50 [ 179.247807] SyS_pivot_root+0x12f/0xea0 [ 179.249283] ----------------------------- [ 179.251791] ? check_preemption_disabled+0x3c/0x250 [ 179.251808] ? wait_for_completion+0x420/0x420 [ 179.251822] ? path_is_under+0xa0/0xa0 [ 179.251834] ? fput+0xd4/0x150 [ 179.251843] ? SyS_write+0x15e/0x230 [ 179.251857] ? do_syscall_64+0x53/0x640 [ 179.251869] ? path_is_under+0xa0/0xa0 [ 179.251882] do_syscall_64+0x1e8/0x640 [ 179.251890] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 179.251905] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 179.251913] RIP: 0033:0x459829 [ 179.251919] RSP: 002b:00007f29ec1dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 179.251930] RAX: ffffffffffffffda RBX: 00007f29ec1dec90 RCX: 0000000000459829 [ 179.251935] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000080 [ 179.251946] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 179.270807] net/tipc/bearer.c:177 suspicious rcu_dereference_protected() usage! [ 179.272822] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29ec1df6d4 [ 179.272829] R13: 00000000004c6568 R14: 00000000004db380 R15: 0000000000000003 [ 179.704044] [ 179.704044] other info that might help us debug this: [ 179.704044] [ 179.741416] [ 179.741416] rcu_scheduler_active = 2, debug_locks = 1 [ 179.781127] 2 locks held by syz-executor.3/7765: [ 179.803684] #0: (cb_lock){++++}, at: [] genl_rcv+0x1a/0x40 [ 179.822749] #1: (genl_mutex){+.+.}, at: [] genl_rcv_msg+0x119/0x150 [ 179.880223] [ 179.880223] stack backtrace: [ 179.884815] CPU: 1 PID: 7765 Comm: syz-executor.3 Not tainted 4.14.134 #29 [ 179.891861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.901224] Call Trace: [ 179.903831] dump_stack+0x138/0x19c [ 179.907469] ? vprintk_func+0x65/0x159 [ 179.911365] lockdep_rcu_suspicious+0x153/0x15d [ 179.916046] tipc_bearer_find+0x20a/0x300 [ 179.920202] tipc_nl_compat_link_set+0x433/0xbf0 [ 179.924974] tipc_nl_compat_doit+0x16b/0x510 [ 179.929391] ? security_capable+0x8e/0xc0 [ 179.933543] ? tipc_nl_compat_link_stat_dump+0x2080/0x2080 [ 179.939184] ? ns_capable_common+0x12c/0x160 [ 179.943602] ? ns_capable+0x23/0x30 [ 179.947238] ? __netlink_ns_capable+0xe2/0x130 [ 179.951826] tipc_nl_compat_recv+0x9b8/0xaf0 [ 179.956247] ? __lock_is_held+0xb6/0x140 [ 179.960315] ? tipc_nl_compat_doit+0x510/0x510 [ 179.964903] ? tipc_nl_node_dump+0xc90/0xc90 [ 179.969325] ? tipc_nl_compat_bearer_enable+0x570/0x570 [ 179.974709] ? genl_rcv_msg+0x119/0x150 [ 179.978705] ? genl_rcv_msg+0x119/0x150 [ 179.982695] genl_family_rcv_msg+0x614/0xc30 [ 179.987121] ? genl_rcv+0x40/0x40 [ 179.990592] ? __dev_queue_xmit+0xd33/0x25e0 [ 179.994997] ? trace_hardirqs_on+0xd/0x10 [ 179.999143] ? __local_bh_enable_ip+0x99/0x1a0 [ 180.003742] genl_rcv_msg+0xb4/0x150 [ 180.007464] netlink_rcv_skb+0x14f/0x3c0 [ 180.011540] ? genl_family_rcv_msg+0xc30/0xc30 [ 180.016124] ? netlink_ack+0x9a0/0x9a0 [ 180.020005] ? genl_rcv+0x1a/0x40 [ 180.023468] genl_rcv+0x29/0x40 [ 180.026838] netlink_unicast+0x45d/0x780 [ 180.030914] ? netlink_attachskb+0x6a0/0x6a0 [ 180.035324] ? security_netlink_send+0x81/0xb0 [ 180.039905] netlink_sendmsg+0x7c4/0xc60 [ 180.043983] ? netlink_unicast+0x780/0x780 [ 180.048223] ? security_socket_sendmsg+0x89/0xb0 [ 180.052997] ? netlink_unicast+0x780/0x780 [ 180.057231] sock_sendmsg+0xce/0x110 [ 180.060941] ___sys_sendmsg+0x70a/0x840 [ 180.064908] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 180.069682] ? __fget+0x210/0x370 [ 180.073247] ? find_held_lock+0x35/0x130 [ 180.077313] ? __fget+0x210/0x370 [ 180.080774] ? lock_downgrade+0x6e0/0x6e0 [ 180.084928] ? __fget+0x237/0x370 [ 180.088382] ? __fget_light+0x172/0x1f0 [ 180.092352] ? __fdget+0x1b/0x20 [ 180.095713] ? sockfd_lookup_light+0xb4/0x160 [ 180.100209] __sys_sendmsg+0xb9/0x140 [ 180.104008] ? SyS_shutdown+0x170/0x170 [ 180.107978] ? put_timespec64+0xb4/0x100 [ 180.112050] ? SyS_clock_gettime+0xf8/0x180 [ 180.116386] SyS_sendmsg+0x2d/0x50 [ 180.120109] ? __sys_sendmsg+0x140/0x140 [ 180.124181] do_syscall_64+0x1e8/0x640 [ 180.128172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 180.133127] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 180.138414] RIP: 0033:0x459829 [ 180.141604] RSP: 002b:00007f1d29352c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 180.149322] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 180.156603] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000003 [ 180.163892] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 180.171173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1d293536d4 [ 180.178500] R13: 00000000004c72d2 R14: 00000000004dc760 R15: 00000000ffffffff 17:50:20 executing program 1 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:20 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syzkaller1\x00', 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) setreuid(r1, 0x0) 17:50:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x5) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000140)={'veth0_to_bond\x00', {0x2, 0x4e21, @remote}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) getsockname$unix(r1, &(0x7f0000000180), &(0x7f0000000200)=0x6e) sendto$ax25(r1, &(0x7f00000003c0)="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", 0x1000, 0x80, &(0x7f0000000040)={{0x3, @default}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000380)=ANY=[@ANYBLOB="20000000180021850e000000000000001c140000fe00000100000000040019000000000070b8c3762853338173845d43c63eb77b34b74f7c180adea0ef3522"], 0x20}}, 0x0) 17:50:20 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:20 executing program 4: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) [ 180.375382] FAULT_INJECTION: forcing a failure. [ 180.375382] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 180.387248] CPU: 1 PID: 7782 Comm: syz-executor.1 Not tainted 4.14.134 #29 [ 180.394288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.403691] Call Trace: [ 180.406308] dump_stack+0x138/0x19c [ 180.409960] should_fail.cold+0x10f/0x159 [ 180.414137] __alloc_pages_nodemask+0x1d6/0x7a0 [ 180.418843] ? fs_reclaim_acquire+0x20/0x20 [ 180.423185] ? __alloc_pages_slowpath+0x2930/0x2930 [ 180.428225] cache_grow_begin+0x80/0x400 [ 180.432306] kmem_cache_alloc+0x6a6/0x780 [ 180.436468] getname_flags+0xcb/0x580 [ 180.440293] user_path_at_empty+0x2f/0x50 [ 180.444455] SyS_pivot_root+0x12f/0xea0 [ 180.448441] ? check_preemption_disabled+0x3c/0x250 [ 180.453486] ? wait_for_completion+0x420/0x420 [ 180.458101] ? path_is_under+0xa0/0xa0 [ 180.462015] ? fput+0xd4/0x150 [ 180.465225] ? SyS_write+0x15e/0x230 [ 180.468955] ? do_syscall_64+0x53/0x640 17:50:20 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f00000004c0)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000040)={0x4, 0x80, 0x5}) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003fffffffffffff000cfb193e7ee00"/88, 0x58}], 0x1) 17:50:20 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) [ 180.472950] ? path_is_under+0xa0/0xa0 [ 180.477752] do_syscall_64+0x1e8/0x640 [ 180.481656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 180.486526] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 180.491734] RIP: 0033:0x459829 [ 180.494928] RSP: 002b:00007f29ec1dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 180.502838] RAX: ffffffffffffffda RBX: 00007f29ec1dec90 RCX: 0000000000459829 [ 180.510123] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000080 [ 180.517415] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 180.517427] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29ec1df6d4 [ 180.517432] R13: 00000000004c6568 R14: 00000000004db380 R15: 0000000000000003 17:50:20 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) socket$pppoe(0x18, 0x1, 0x0) open(&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x0) 17:50:20 executing program 2: ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1be, 0x0) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x40002) 17:50:20 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x8000000022084, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x6, 0x2, 0x0, 0x400, 0x0, 0x0, 0x0, 0x2, 0x6, 0x8000, 0xafdc, 0x9, 0xfffffffffffffff9, 0x5, 0x2, 0x5, 0x10000, 0xffffffffffffa771, 0x101, 0x4, 0x2, 0xfffffffffffffbff, 0x8001, 0x5, 0x4, 0x8, 0x400, 0x7, 0x7f, 0x7f, 0x900000000000, 0x2, 0x9afb, 0x7, 0x1ff, 0x8001, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000000c0), 0xa}, 0xf001, 0x1, 0x1250555f, 0x2, 0x1, 0x6, 0x1}, r2, 0x6, r0, 0xa) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @local, @local}, &(0x7f0000000240)=0xc) [ 180.878612] overlayfs: fs on 'file0' does not support file handles, falling back to index=off. 17:50:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000000c0)={0x0, @bt={0x4, 0x8, 0x1, 0x2, 0x81, 0x4c206e8f, 0x4, 0x8a76, 0x7, 0x10001, 0x6978050c, 0x1, 0x800, 0x22ff, 0x18, 0x25}}) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, 0x2}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x48}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 17:50:20 executing program 1 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:20 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:20 executing program 4: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000080)="b4", 0x1}], 0x1) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x800, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x9, 0x1ff, 0x4}, &(0x7f0000000180)=0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x1f}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r4, 0x4) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) splice(r0, 0x0, r3, 0x0, 0x2000000000a, 0x0) 17:50:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x2c) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x8000000022084, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x6, 0x2, 0x0, 0x400, 0x0, 0x0, 0x0, 0x2, 0x6, 0x8000, 0xafdc, 0x9, 0xfffffffffffffff9, 0x5, 0x2, 0x5, 0x10000, 0xffffffffffffa771, 0x101, 0x4, 0x2, 0xfffffffffffffbff, 0x8001, 0x5, 0x4, 0x8, 0x400, 0x7, 0x7f, 0x7f, 0x900000000000, 0x2, 0x9afb, 0x7, 0x1ff, 0x8001, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000000c0), 0xa}, 0xf001, 0x1, 0x1250555f, 0x2, 0x1, 0x6, 0x1}, r2, 0x6, r0, 0xa) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @local, @local}, &(0x7f0000000240)=0xc) [ 181.301136] FAULT_INJECTION: forcing a failure. [ 181.301136] name failslab, interval 1, probability 0, space 0, times 0 [ 181.334655] CPU: 1 PID: 7830 Comm: syz-executor.1 Not tainted 4.14.134 #29 [ 181.341751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.351123] Call Trace: [ 181.353729] dump_stack+0x138/0x19c [ 181.357402] should_fail.cold+0x10f/0x159 [ 181.361960] should_failslab+0xdb/0x130 [ 181.365952] kmem_cache_alloc+0x2d7/0x780 [ 181.370134] getname_flags+0xcb/0x580 [ 181.373951] user_path_at_empty+0x2f/0x50 [ 181.378201] SyS_pivot_root+0x19d/0xea0 [ 181.382186] ? check_preemption_disabled+0x3c/0x250 [ 181.387217] ? wait_for_completion+0x420/0x420 [ 181.391815] ? path_is_under+0xa0/0xa0 [ 181.395721] ? fput+0xd4/0x150 [ 181.398927] ? SyS_write+0x15e/0x230 [ 181.402657] ? do_syscall_64+0x53/0x640 [ 181.406642] ? path_is_under+0xa0/0xa0 [ 181.410653] do_syscall_64+0x1e8/0x640 [ 181.414542] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 181.419388] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 181.424575] RIP: 0033:0x459829 [ 181.427756] RSP: 002b:00007f29ec1dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 181.435475] RAX: ffffffffffffffda RBX: 00007f29ec1dec90 RCX: 0000000000459829 [ 181.442744] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000080 [ 181.450014] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 181.457369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29ec1df6d4 [ 181.464635] R13: 00000000004c6568 R14: 00000000004db380 R15: 0000000000000003 17:50:21 executing program 1 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:21 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)={0x1, 0x0, 0x0, {}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "244e208387e3322b"}}, 0x38}}, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000140)={0x120000, 0xb, 0x4, 0x1, {0x0, 0x7530}, {0x6, 0x2, 0x1, 0x4, 0x1ff, 0x3, "a8393ccc"}, 0x2, 0x4, @userptr=0x1, 0x4}) 17:50:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02000000040000000000000004000000000000001090bbde441e8fc9d89967f7f10000000ed3a0066456cffb71cb7523b8d553a16033349fae2ecc1d1321564df0714288bf77ba5df7fe99c0169aa0bc3962ea5d0338ad8890ff25551b8634ecea04adc4d819bedeea11dadb19d2433c86426612230009429befb9b89e00a88a6472515ed37cb98b468c24b60ddd5a6028e020f5422702b355186479ded99449b0c99dea9924a7992e6524e82c3fb161ee8577c981f20bd7381eaf8f67988990f715aa99da11b3fe21949ff5fb146112f979faf1bcdea4e68a1c001c68251f0eafbe88f30846d7d47f76c382137925a64e"], 0x24, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b00)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000e1000)='proc\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) fstat(r1, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) r3 = getuid() fstat(r1, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = geteuid() stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) syz_mount_image$iso9660(&(0x7f0000000300)='iso9660\x00', &(0x7f0000000380)='./file0\x00', 0xcd, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="6617d5d1a3896f22069b028cd6bacc27458356c303be54425f439b2b2fe0ca3c653f427628c19ac0dc5b5c72d5775f746107762a10809b474a652a06726aac5f985d7e6f1eb0a79ebd63060d0db93b99aa3f94410c9ebc31ef6ad97f350f6e3ac631c928e45b27c718203ce8e0baf3f582d66f", 0x73, 0x7}, {&(0x7f0000000dc0)="d3ade5df313447b55708ea75db12389c2aa34bc07e23ec14db7be780aece8e6dbd25901a5ee9e9344001261b30899c536d0c299966c66288b4442a77bee084e4463f4ce0a1fa04d22844589f92374c95d5d98529c289ad2b0404c35e4470daa3b5759cf2ebf095adab35945a35cc325e069dad1c909f2ce414f675a1687e9e5bdfd2352e55134d813d3d8a5087bc8745abc1e6f346bc2278c327b52d89d75e52ffeb3f4501d4f8a3b5dfd7263f72bb7e238ecc99dd37af84ed9e407aaed8426b98", 0xc1, 0x5}, {&(0x7f0000000540)="942061918c21d706436f24023384f8ff546fa91a997aac91040c726388370a75b5b7fae1f15d92229f792d63dc8c4de7871719569eaf878fdb9adfde53b40b1d762bd028acc455d46e5b3ee4048650cee943f3ef229feb525a088f5c9b593cbe5717022ae7c1f18e", 0x68, 0x400}, {&(0x7f00000005c0)="9666996c4842ccb24188e224ac53863ec12284d8e7c1a5da89674f94f612684b071eece94201ea806efe2dc2f0eed214314375c032f6526c3668a8c9240e443d13ce1dea2ce1dcf8e0ae601ab134ccd9100ad6b461f8994d9bb0d915e0304d78af1da7b8acdb96f46a49dafb8d94f7f73aeb374002fd05a15afe7add9391899163625ef4c71eb91bc86b310575dc1c2e7a617de0ec0df536c10ffc911e056619e88ca8ef84425d25d45b32759a9cced0f8f9193c9f16af1ddbc63e8bcdbb6139b8764f2351a12d4dce59f79f41cb905eb0d8b3177a0be301b0123f53b5", 0xdd, 0x4}, {&(0x7f00000006c0)="f72a80dae1c5ea439de4ce3d08f39a8ddf03f26067c1caf54598d10064b6be5bd62ccb0eac0f30bb9a495112c1f28d6084697fb592fb7cd7a783c21d038488d675a89452c0689883dcab6a71367cf9ff21df2b8ecb2f7c50af04ca4dfbb2f2434f9fb377fc51c791b3594f46632efe", 0x6f, 0x1ff}, {&(0x7f0000000740)="7c39e8110488c9b639463ed89a7b52d41ab25992d04fafdf0542b16f7a930b64a8b999fcbb982f", 0x27, 0x80000001}], 0x1000000, &(0x7f0000001000)={[{@map_normal='map=normal'}, {@uid={'uid', 0x3d, r3}}, {@map_normal='map=normal'}, {@map_acorn='map=acorn'}, {@cruft='cruft'}, {@dmode={'dmode', 0x3d, 0xf1}}, {@overriderock='overriderockperm'}, {@uid={'uid', 0x3d, r4}}], [{@obj_user={'obj_user', 0x3d, 'system.posix_acl_default\x00'}}, {@pcr={'pcr', 0x3d, 0x2b}}, {@dont_appraise='dont_appraise'}, {@smackfstransmute={'smackfstransmute'}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'overriderockperm'}}]}) renameat(r0, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') 17:50:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000100)={'veth0_to_bond\x00', {0x2, 0x4e21, @remote}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xffffffffffffff4e, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x2c, 0x14, 0x205, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0xff0b}}, 0x0) r2 = dup3(r0, r0, 0x80000) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000140)={0x101, 0x2, 0x1}) [ 181.644766] FAULT_INJECTION: forcing a failure. [ 181.644766] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 181.656623] CPU: 1 PID: 7842 Comm: syz-executor.1 Not tainted 4.14.134 #29 [ 181.663646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.673015] Call Trace: [ 181.675623] dump_stack+0x138/0x19c [ 181.679277] should_fail.cold+0x10f/0x159 [ 181.683538] __alloc_pages_nodemask+0x1d6/0x7a0 [ 181.688227] ? fs_reclaim_acquire+0x20/0x20 [ 181.692570] ? __alloc_pages_slowpath+0x2930/0x2930 [ 181.697628] cache_grow_begin+0x80/0x400 [ 181.698722] Unknown ioctl -1067952547 [ 181.701939] kmem_cache_alloc+0x6a6/0x780 [ 181.701956] getname_flags+0xcb/0x580 [ 181.701969] user_path_at_empty+0x2f/0x50 [ 181.701985] SyS_pivot_root+0x19d/0xea0 [ 181.721900] ? check_preemption_disabled+0x3c/0x250 [ 181.726949] ? wait_for_completion+0x420/0x420 [ 181.731569] ? path_is_under+0xa0/0xa0 [ 181.735472] ? fput+0xd4/0x150 [ 181.738676] ? SyS_write+0x15e/0x230 [ 181.742403] ? do_syscall_64+0x53/0x640 [ 181.746387] ? path_is_under+0xa0/0xa0 [ 181.750286] do_syscall_64+0x1e8/0x640 [ 181.754183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 181.759045] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 181.764245] RIP: 0033:0x459829 [ 181.767436] RSP: 002b:00007f29ec1dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 181.775163] RAX: ffffffffffffffda RBX: 00007f29ec1dec90 RCX: 0000000000459829 [ 181.782462] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000080 [ 181.789739] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 181.797017] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29ec1df6d4 [ 181.804288] R13: 00000000004c6568 R14: 00000000004db380 R15: 0000000000000003 17:50:21 executing program 5: syz_open_dev$dmmidi(&(0x7f00000017c0)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000000)=@buf={0x1, &(0x7f00000000c0)="b2"}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="c6ef157d03adc9514c2e41a8bf390239054af9caf1a3f5b0", 0x18, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000400)={r0, r0, r1}, &(0x7f0000002700)=""/83, 0xffffff84, 0x0) 17:50:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\xc8\x8b\xc0XE\xf1\x93D\xa9\x02\xdb\xb7\x84b\xf3\a\xc3\xaa\xd0\xed\x9a\xff\xff\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3', &(0x7f0000000080)=@keyring={'key_or_keyring:', r0}) keyctl$link(0x8, r0, r1) 17:50:21 executing program 1 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:21 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x420440, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0xb7, "3680eea0cd7ff1542efa022d597756327d78c163d7dcc214a0ef0f55458d589bd877bef14d9a457b10b65320f02c1c7613b885cc7c4e8f2f66f686edc6c671c8559bc3adc5a088c331ce14502a84287a3c27366223750ff91ba8de746e29733e9f1f8b7920db8272ae54937b5b1f2d775fc0ff35e916d7378a661bb14e1a22b1e8e543ac13a73d084990b45331710e758e5df2c4380bf47e1dc7e4df51a46099f2149365df4d54c350766d81128ac9b9678ac423a055ea"}, &(0x7f0000000200)=0xbf) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={r2, 0x8001, 0x10, 0x6, 0x2}, &(0x7f0000000280)=0x18) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) connect$l2tp(r0, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000040)=""/14, &(0x7f0000000100)=0xe) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x0, 0x2, 0x4, {0xa, 0x4e22, 0x1ff, @empty, 0x568000000000000}}}, 0x32) fsetxattr$security_ima(r1, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@md5={0x1, "3319bd94c28b6bc0e3938be86035d5b4"}, 0x11, 0x1) [ 182.189947] FAULT_INJECTION: forcing a failure. [ 182.189947] name failslab, interval 1, probability 0, space 0, times 0 [ 182.259679] CPU: 1 PID: 7874 Comm: syz-executor.1 Not tainted 4.14.134 #29 [ 182.266898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.276356] Call Trace: [ 182.278982] dump_stack+0x138/0x19c [ 182.284033] should_fail.cold+0x10f/0x159 [ 182.288208] should_failslab+0xdb/0x130 [ 182.292211] kmem_cache_alloc_trace+0x2e9/0x790 [ 182.297076] ? lock_downgrade+0x6e0/0x6e0 [ 182.301299] get_mountpoint+0xd4/0x330 [ 182.305205] lock_mount+0xe0/0x2c0 [ 182.308776] SyS_pivot_root+0x274/0xea0 [ 182.312770] ? check_preemption_disabled+0x3c/0x250 [ 182.317806] ? wait_for_completion+0x420/0x420 [ 182.322408] ? path_is_under+0xa0/0xa0 [ 182.326330] ? SyS_write+0x15e/0x230 [ 182.330107] ? path_is_under+0xa0/0xa0 [ 182.334036] do_syscall_64+0x1e8/0x640 [ 182.337954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 182.342961] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 182.348354] RIP: 0033:0x459829 [ 182.351565] RSP: 002b:00007f29ec1dec78 EFLAGS: 00000246 ORIG_RAX: 000000000000009b 17:50:22 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x240400, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000200)={0x3, 0x1, [0x7, 0x33, 0x6, 0x0, 0xc74, 0x6007cc05, 0xffffffffffff2ada]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = syz_open_dev$usbmon(0x0, 0x2, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000000)={0x1d}) remap_file_pages(&(0x7f00000bc000/0x4000)=nil, 0x4000, 0x1000000, 0xffff, 0xc000) mremap(&(0x7f0000182000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f00000be000/0x2000)=nil) process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x35c}], 0x352, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000100)={0xf, @capture={0x1000, 0x1, {0x5, 0x3}, 0x8, 0x3}}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x8001, 0x0) [ 182.359376] RAX: ffffffffffffffda RBX: 00007f29ec1dec90 RCX: 0000000000459829 [ 182.367132] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000080 [ 182.374424] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 182.381715] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f29ec1df6d4 [ 182.389009] R13: 00000000004c6568 R14: 00000000004db380 R15: 0000000000000003 [ 182.473388] mmap: syz-executor.3 (7881) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 17:50:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)={0x100000000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) 17:50:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000180)={@multicast2, @loopback}, 0xc) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000140)={'nlmon0\x00', 0x10000}) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000002c0)={0x6, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast2}}}, 0x108) keyctl$session_to_parent(0x12) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x41e000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000200)={0x0, 0xa9c}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000400)={r2, @in={{0x2, 0x4e21, @broadcast}}, [0x4, 0xa1c, 0xe8, 0xffffffff, 0x5, 0x16d, 0x20, 0xffffffff80000001, 0x8, 0x1, 0x1, 0x0, 0x43af7dff, 0x1, 0x1]}, &(0x7f0000000280)=0x100) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000500)={'irlan0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x108) 17:50:22 executing program 5: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TIOCNXCL(r1, 0x540d) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x5ffd) socket$inet6(0xa, 0xf, 0x89) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) vmsplice(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="38f2e1f0c2206da756fc527aceca3f3158619e6d11eae3e6160f79b77e4f8c43a7c40b031d050429fead04fd33021d79d12bf418958778450545412c19f2c14bf2c0400dbe5768e6c330848f0a99e1bc6685eea0927098d7fe5ba40c02d3a36fd37ee098eb8d274b6cac0c6bf3348f1b0b739a4f1c6574625d0dd39337392e5207bdd0a422424a3258930a0b6e3137ff602c2cea8ee3c5115717bd61f406ff4a69f8bd1c46999e33af2c8899e08140df2f0b48cb15f52cd5c405eb650d", 0xbd}, {&(0x7f0000000180)="9b2877ab24f8b67be90b03a3e79ea1ffb37e9cddd3a2f6e81e0f6e5d6fc0980e816fe000ebc1c26938c0276ab1f8d83a5d1fb06908c58ceedb47443d217c2ebc5fd6590d31e130d86cecf351f434dcaabd5ad10d7e8d4feaf80501", 0x5b}], 0x2, 0x1) 17:50:22 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:22 executing program 1 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0xcee9b79d646e3b10) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video1\x00', 0x2, 0x0) close(r2) 17:50:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0xc000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080)=0x3, 0x4) 17:50:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) getxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='security.apparmor\x00', &(0x7f0000000240)=""/73, 0x49) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000002c0)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80020802}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r2, 0x1, 0x70bd2d, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x81) ioctl$NBD_CLEAR_QUE(r1, 0xab05) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') [ 182.649398] pit: kvm: requested 2514 ns i8254 timer period limited to 500000 ns 17:50:22 executing program 3: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfc0004) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3f, 0x400) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x5c, 0x8000, "e37a9cc2dcf1754ecaa52fa9529f82ed5d5f2934fc77a46fc637fffa44b90a239c1fa6834b4f30522e5935ea9e78213aac9b63dc67c8910c18b5e2295f0ef48e86fdcdbf094d99931d4bfd671c9be809e377a957"}, &(0x7f0000000180), 0x1400) r2 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x74, &(0x7f0000000040)={0x0, 0xa}, &(0x7f0000000080)=0x18) 17:50:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = socket(0x400000000010, 0x3, 0x0) recvmsg(r1, &(0x7f00000027c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000140)=0x522, 0xe) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x27, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f00000000c0)) write(r1, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) 17:50:22 executing program 2: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000001c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x3217c0, 0x0) readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000040)=""/146, 0x92}, {&(0x7f0000000200)=""/189, 0xbd}, {&(0x7f00000002c0)=""/147, 0x93}, {&(0x7f0000000380)=""/170, 0xaa}, {&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f0000000440)=""/239, 0xef}, {&(0x7f00000008c0)=""/158, 0x9e}, {&(0x7f0000000980)=""/71, 0x47}, {&(0x7f0000000a00)=""/113, 0x71}, {&(0x7f0000000a80)=""/122, 0x7a}], 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000580)="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", 0xfffffffffffffd69, 0x50, 0x0, 0xffffffef) 17:50:22 executing program 4: socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0x10, 0x6}, @IFLA_LINKINFO={0x25, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x50}}, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r3, 0x4417}, &(0x7f0000000200)=0x8) 17:50:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000180)) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') [ 182.896541] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.4'. 17:50:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) r2 = semget(0x3, 0x3, 0x1) semctl$GETNCNT(r2, 0x2, 0xe, &(0x7f0000000000)=""/179) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x4}, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) [ 183.013398] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.4'. 17:50:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='lapb0\x00'}) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') [ 183.514061] protocol 88fb is buggy, dev hsr_slave_0 [ 183.519640] protocol 88fb is buggy, dev hsr_slave_1 17:50:23 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:23 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r0, 0x27, &(0x7f00000000c0)={0x3, 0x7, 0x5, 0x1, r3}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 17:50:23 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x805c6103, &(0x7f00000001c0)) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000040)={&(0x7f0000000000)=[0x1ff], 0x1, 0x3f, 0x6, 0x9, 0x2, 0x8, {0x7fffffff, 0x4, 0xffffffffffffff80, 0x6, 0x80000000, 0x5, 0x1ff, 0x3, 0xa98, 0x3, 0x9, 0xfe3f, 0x3, 0x400, "de19d2d58277eb5e421fdacb7e5e9641c0ec97a8e992fa3118131200a3f5fa6f"}}) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f00000000c0)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000140)={0xbcde, 0x87, 0x400, 0x7, 0x6, 0x100, 0xc0, 0x8b, 0xffffffffffffff03, 0x2}) 17:50:23 executing program 2: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000001c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x3217c0, 0x0) readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000040)=""/146, 0x92}, {&(0x7f0000000200)=""/189, 0xbd}, {&(0x7f00000002c0)=""/147, 0x93}, {&(0x7f0000000380)=""/170, 0xaa}, {&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f0000000440)=""/239, 0xef}, {&(0x7f00000008c0)=""/158, 0x9e}, {&(0x7f0000000980)=""/71, 0x47}, {&(0x7f0000000a00)=""/113, 0x71}, {&(0x7f0000000a80)=""/122, 0x7a}], 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000580)="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", 0xfffffffffffffd69, 0x50, 0x0, 0xffffffef) 17:50:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:23 executing program 3: clone(0x3102401ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r0, 0x10c, 0xe, &(0x7f0000000040)=0x10000, 0x4) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x7fffffff, 0x80) getpeername$ax25(r1, &(0x7f0000000100)={{0x3, @netrom}, [@bcast, @remote, @null, @netrom, @bcast, @netrom]}, &(0x7f0000000180)=0x48) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000080)='ppp0.@#user{-\x00\xf1\x02\x18\\\xc2@s\xf1\x15', 0xfffffffffffffffe) 17:50:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x10000) ioctl$TCFLSH(r1, 0x540b, 0x10001) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000440)=""/96, 0x60}], 0x1}, 0x0) 17:50:23 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0) lstat(&(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000280)='jfs\x00', &(0x7f00000002c0)='./file0/file0\x00', 0x8b1, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000300)="8c5facc849cfe8323c15187483936960f1e59ef9ce3713eb1aefdf4c208573c4b4467a4879", 0x25, 0x5}, {&(0x7f0000000340)="51f46ca221166231fb3b82aed12ca583a6f06a26c84c3c73be9edcb5dc2b5da7a3ce97e0d27224e481fa4b7d65d7b2e79bc530b8de610caacb7b7ceae77783b31c65fa6aed92536ccf01ba7576d0bb", 0x4f, 0x2}], 0x800, &(0x7f00000006c0)={[{@discard='discard'}, {@grpquota='grpquota'}], [{@fowner_gt={'fowner>', r1}}, {@uid_lt={'uid<', r2}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r3}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r4}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/input/mice\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) r5 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400000) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimensat(r5, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)={{r6, r7/1000+10000}, {r8, r9/1000+10000}}, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:23 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0x2}, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x1, 0xb, 0x230f}, &(0x7f0000000140)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x2}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x10, &(0x7f00000002c0)={&(0x7f0000000040)=""/59, 0x3b, r1}}, 0x10) keyctl$reject(0x13, 0x0, 0x0, 0x400000000000204, 0x0) 17:50:23 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000040)=@ethtool_dump={0x40, 0x1, 0x4, 0x84, "d3282ee3e31e97267285c7aa71d9c887c422affb1a9787e33b39833e8a3c774c1d671f09a0dac5fe1fc2f0b51b742a0a85ff06519829d61964d5341a675261d5d94771baaf8264fe6b327456d34bc7aa2e9ffa8326fcaee457674500ea008b0d2eebb60daa728b82412ef63e94811159e77b154e27b14b6a515d05e9087f01a05d3907c3"}}) clone(0x180000102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 17:50:23 executing program 2: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000001c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x3217c0, 0x0) readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000040)=""/146, 0x92}, {&(0x7f0000000200)=""/189, 0xbd}, {&(0x7f00000002c0)=""/147, 0x93}, {&(0x7f0000000380)=""/170, 0xaa}, {&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f0000000440)=""/239, 0xef}, {&(0x7f00000008c0)=""/158, 0x9e}, {&(0x7f0000000980)=""/71, 0x47}, {&(0x7f0000000a00)=""/113, 0x71}, {&(0x7f0000000a80)=""/122, 0x7a}], 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000580)="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", 0xfffffffffffffd69, 0x50, 0x0, 0xffffffef) [ 184.114665] JFS: discard option not supported on device 17:50:23 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffffff, 0xc0406400, &(0x7f00000000c0)={0x6, 0x3, 0x2, 0x1000, &(0x7f0000000440)=""/4096, 0xfe, &(0x7f0000001440)=""/254, 0xc3, &(0x7f0000001540)=""/195}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x3) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000001c0)=0x0) ptrace$setregs(0xf, r4, 0x478f, &(0x7f0000000280)="33edd6827484a4528f800fe5897c966501d9c7e25b1f890ce0fba783483fb92bb60ffd398aefbaefbbcddb22e5134dfc85e2361006e290372c4d2f4df41c991318249a76828e490392c792da31da238e44831c9876d24bc99cff11c707f686") ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa, 0x0, 0x0, 0x100a0}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000140)={0x8, 0x1f}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='veth1_to_bridge\x00', 0x10) [ 184.169129] jfs: Unrecognized mount option "fowner>00000000000000000000" or missing value [ 184.383279] *** Guest State *** [ 184.404014] CR0: actual=0xffffffff9ffffffa, shadow=0xfffffffffffffffa, gh_mask=fffffffffffffff7 [ 184.464307] CR4: actual=0x00000000000120e0, shadow=0x00000000000100a0, gh_mask=ffffffffffffe871 [ 184.546680] CR3 = 0x0000000000000000 [ 184.568170] PDPTR0 = 0x0000007b00000004 PDPTR1 = 0x0000000000000000 [ 184.604939] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000400 [ 184.634041] RSP = 0x000000000000fffc RIP = 0x0000000000000247 [ 184.666468] RFLAGS=0x00010006 DR7 = 0x0000000000000400 [ 184.673708] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 184.680500] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 184.688597] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 184.706075] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 184.714328] ES: sel=0x0000, attr=0x0808b, limit=0x00000000, base=0x0000000000000000 [ 184.722377] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 184.735557] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 184.743712] GDTR: limit=0x00000000, base=0x0000000000000000 [ 184.753746] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 184.764137] IDTR: limit=0x00000000, base=0x0000000000000000 [ 184.778384] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 184.788900] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 184.799348] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 184.809511] Interruptibility = 00000000 ActivityState = 00000000 [ 184.818074] *** Host State *** [ 184.823747] RIP = 0xffffffff81173b7f RSP = 0xffff88804fb0f998 [ 184.829859] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 184.838610] FSBase=00007f1d29353700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000 [ 184.856682] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 184.862673] CR0=0000000080050033 CR3=000000009c167000 CR4=00000000001426f0 [ 184.869705] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018f0 [ 184.881007] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 184.887113] *** Control State *** [ 184.893675] PinBased=0000003f CPUBased=b6986dfa SecondaryExec=000000e2 [ 184.902743] EntryControls=0000d1ff ExitControls=002fefff [ 184.908235] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 184.918268] VMEntry: intr_info=8000030e errcode=00000000 ilen=00000000 [ 184.926566] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001 [ 184.936212] reason=80000021 qualification=0000000000000000 [ 184.944150] IDTVectoring: info=00000000 errcode=00000000 [ 184.949621] TSC Offset = 0xffffff9ab3349507 [ 184.957751] EPT pointer = 0x000000008fb9e01e [ 184.964003] Virtual processor ID = 0x0001 17:50:24 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:24 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000040)=@ethtool_dump={0x40, 0x1, 0x4, 0x84, "d3282ee3e31e97267285c7aa71d9c887c422affb1a9787e33b39833e8a3c774c1d671f09a0dac5fe1fc2f0b51b742a0a85ff06519829d61964d5341a675261d5d94771baaf8264fe6b327456d34bc7aa2e9ffa8326fcaee457674500ea008b0d2eebb60daa728b82412ef63e94811159e77b154e27b14b6a515d05e9087f01a05d3907c3"}}) clone(0x180000102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 17:50:24 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'lapb0\x00'}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x19}]}}}]}, 0x3c}}, 0x0) 17:50:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x20000, 0x140) getresuid(&(0x7f0000000340), &(0x7f0000000400)=0x0, &(0x7f00000003c0)) setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0/file0\x00', 0xe, 0x1) setxattr$security_capability(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f00000002c0)=@v3={0x3000000, [{0x9, 0xfffffffffffffff8}, {0x7, 0x7}], r0}, 0x18, 0x3) 17:50:24 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r0, 0x27, &(0x7f00000000c0)={0x3, 0x7, 0x5, 0x1, r3}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 17:50:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") prctl$PR_SET_KEEPCAPS(0x8, 0x1) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005080)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="e14d831f006f8b934df0174a1d530f977311cd9c044813689e583b9b03b48a879d3d2039914263dd6d9df76a8a96121c0a817c02", 0x34}], 0x1}}], 0x1, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 17:50:24 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000040)=@ethtool_dump={0x40, 0x1, 0x4, 0x84, "d3282ee3e31e97267285c7aa71d9c887c422affb1a9787e33b39833e8a3c774c1d671f09a0dac5fe1fc2f0b51b742a0a85ff06519829d61964d5341a675261d5d94771baaf8264fe6b327456d34bc7aa2e9ffa8326fcaee457674500ea008b0d2eebb60daa728b82412ef63e94811159e77b154e27b14b6a515d05e9087f01a05d3907c3"}}) clone(0x180000102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 185.209072] SELinux: unknown mount option 17:50:24 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'dummy0\x00', &(0x7f0000000040)=@ethtool_dump={0x40, 0x1, 0x4, 0x84, "d3282ee3e31e97267285c7aa71d9c887c422affb1a9787e33b39833e8a3c774c1d671f09a0dac5fe1fc2f0b51b742a0a85ff06519829d61964d5341a675261d5d94771baaf8264fe6b327456d34bc7aa2e9ffa8326fcaee457674500ea008b0d2eebb60daa728b82412ef63e94811159e77b154e27b14b6a515d05e9087f01a05d3907c3"}}) clone(0x180000102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 17:50:24 executing program 1: mkdir(&(0x7f00000009c0)='./file0\x00', 0x20000000) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept(r0, &(0x7f0000000840)=@x25={0x9, @remote}, &(0x7f00000008c0)=0x80) r2 = dup(0xffffffffffffffff) futimesat(r2, &(0x7f0000000980)='./file0\x00', &(0x7f0000000940)={{0x0, 0x2710}}) getsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000480), &(0x7f0000000800)=0x4) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000180)='.\x00', 0xfff, 0x7, &(0x7f0000000600)=[{&(0x7f00000001c0)="aaf382eb67f9b6692687f7ad24ab590156e26c14c4bb2215abbf96a01e333e6095fdff394463205a5929d10af160d4cc2b7dcafdcbbabc63e005f977dc5b871efb35fb8d644eb209e14a79ca95ecaed461158131bef8e29b64efd53802e9729925f29fbf29eb46ed86c594d32f1f150d064ae0412804ee7f1f83478d07ed659a8730e3ee0cb80c7c3b21ab8a39553afafd19f4", 0x93, 0x6}, {&(0x7f0000000280)="5219ab41a8865d25c2517ec5eb617644caf286dc46a8ad89cb2ef38895279c60f54280298f55356b5e5ca3d9272e50373737c7fbec901641d46ca792a734ad25401b49f31b18285f5986f65cbb4fafd81a7cad682d5e2aa3825f5e38446849ae72f66797a32adc95e0f503545be4fa2c4c2bf4405f94b936532eb4b1c89f9b629d0f22a83ec36147c70b0e92f33600c6ae76ec3eb9", 0x95}, {&(0x7f0000000340)="adda7686b07e5a4255406f4c932d2ec7f63f12b2329efa824cf145c381380123ed8fbfbe76d77238ba46b53388a5153ff22d19c9c787209dafa2520453ab69f566c2d76d3d18874c840f78f4dc33aef706a9f59653028c3ed584ac4fdf2a78278966b62dd37057acde9a3ce564b9e6e74bc87cbf8823f9065ddfdf8e3d2d2558b72d333c35c64eab28faf767d5d80e5bd84e5e5300ab037da130d8ecc1bd5bc2ef88059fc49bfeb4387e6790829d9eca8818910e8d35042147362afcb4", 0xbd, 0x4}, {&(0x7f0000000400)="61ed1d469188d8a4a94515d091b85f5dc62bb4859c8702c68065ca2cea5d4fda45bd9a80b9d97b16bea51244fc665cef2319769a49728b265ea844cf01df9ebee1c84a3c4ffade33b898b8a127e17e53c29eb3262152be1e58f2eaf0719002b19640afe416f6e5c7afe932b8", 0x6c, 0x3ff}, {&(0x7f00000007c0)="102821484c6138549eedaf69e5ba5ffe44a0523d980e8950c0eca9782e785b18af8d43f2a8ee6a5be6afef0d305d135cd0b9a8dc43792a316b", 0xffc4, 0x8}, {&(0x7f00000004c0)="3fb0be1623b1c883b0b851f88b0d6ba083d27e4d67196b463df3c81064e563b82f45d7a8feddfddbf8d2a5e0079868182961bbdacd75673f2ba9b029fdf039af36985c4174f5aab9d6aee3273977ada8a55bec4e33f5371a8708c75ee8c963ee3f12a3d29cceaaf82d1854a0475443dbd2f36022243ef25a3b9487110db98610", 0x80, 0x9}, {&(0x7f0000000540)="78a98b9c0a6c0d92b272d2e4ac5505ff1eb0b7b83b8e31779b799e609217d0fc097190f04a2a365650fde79f145c4646d46cbd4edd8b810f78d02d39f6639bfb572876b3c68e43c08f9b58ef2c56de546e54649b2656247311248fe4ccbf56bc64c6469c28d271cd9c87fc20702070e5a96d99e18d08b2a904a2943be1dd6666baf02927066aa0174c367338632b62a4f59d7a80d81929bc0ef287262ab75c7f2e1eab30e097b16a733123220b56f6e3a6d08e26a86c456decc5", 0xba, 0x5}], 0x10000, &(0x7f00000006c0)={[{@nodecompose='nodecompose'}, {@force='force'}, {@part={'part', 0x3d, 0x8}}, {@nodecompose='nodecompose'}, {@decompose='decompose'}], [{@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x36, 0x76, 0x65, 0x65, 0x65, 0x39], 0x2d, [0x31, 0x38, 0x63, 0x13481709e9d12926], 0x2d, [0x66, 0x38, 0x36, 0x64], 0x2d, [0x77, 0x0, 0x76, 0x31], 0x2d, [0x77, 0x34, 0x66, 0x34, 0x32, 0x0, 0x0, 0x77]}}}, {@subj_type={'subj_type', 0x3d, '\\'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '%'}}, {@obj_role={'obj_role', 0x3d, ':vboxnet1-vboxnet1bdev'}}]}) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_STOP(r2, 0x54a1) [ 185.232443] (unnamed net_device) (uninitialized): option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 185.254368] SELinux: unknown mount option 17:50:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1ff, 0x3ff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:50:25 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x1006003, 0x0) prctl$PR_SET_FPEXC(0xc, 0x1) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40002, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000540)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x3c0, r2, 0x100, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e24, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_BEARER={0x10c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x3, @ipv4={[], [], @multicast2}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xfffffffffffffff7, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x492}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bond0\x00'}}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffff001}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb60a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x20}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc000000000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'bridge_slave_0\x00'}}]}, @TIPC_NLA_LINK={0x114, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6fc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6d33}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff39}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x3c0}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f00000000c0)) [ 185.394743] hfsplus: unable to parse mount options 17:50:25 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8000, 0x1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0), 0x4) r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x31, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) [ 185.505223] hfsplus: unable to parse mount options 17:50:25 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:25 executing program 1: r0 = geteuid() syz_mount_image$ntfs(&(0x7f0000000380)='ntfs\x00', &(0x7f00000003c0)='./file0/file0\x00', 0x3, 0x9, &(0x7f00000008c0)=[{&(0x7f0000000400)="cd2360a7c00fed1bf0856d250649c5757f6484126319d30ca77e733a89078a4c9094118514f5a57286b7f0f6d0268f511621e5363bdf6bbf63374da408b08444d2e14f33e9c6371794a82bbb8595d36181bb0d5d836be57d6cac61a8ecd29bd3e0852f395cb30df09688f66b53dd837d45c5c9a5dc3d84a42df1a4cd6605f8a2991456eb7892b51cb2a0328501e11c5c449bebc96d2340202d", 0x99, 0x40}, {&(0x7f00000004c0)="e43146b79475610a722894631ba9a8fa94d0dd1b4b360fe6bd136267b53f6387d26574724b444691cd68d1b803966b9f2f8c81d59629f7082332953097b8708c146619b43362ad046ca8a758e8a20b55f79246b035d4be85ee62e345109d546fff993a8b460994350774c7de355980b801694e5771a1338952aa4e937de03636fdf439434ce020ece3e3cdfd767aa4d81196e69293878c90f3ccf06346eaf86c3441471d5517df93598b91d2506eae160663c9dc4008bf2a6bb4f25f", 0xbc, 0xfffffffffffffff7}, {&(0x7f0000000580)="aec8ca5011f42114d34a18a544687a08f327b7bae84e5e1df884f25b90c3662e08d963c947aa4e08439e0fef98b6699ffd36410384b00c2cefa006", 0x3b, 0x1}, {&(0x7f00000005c0)="a9bd7b0a8c7378a9c3b1bc180f18a2eb8a34ade638e085bf66f7e0eeaeb0ba16327006551f3f878aaffc0b664c9bcc6f554ae8e0b142e1a16b0eb012586c6c1817d65b6defcb2abb822d461e96415100462805dd646a5afbbafb396ce5263f03912f235fa46eeae3513bfc43", 0x6c, 0xb15}, {&(0x7f0000000640)="e9379dea09162c6e975ff256902d7a2a9383dfa4429b647ed337a66fbf79cbfbeb83cc8f3760175181c25af0c465fe3af34de5b21e8ee32d6b8812db4efcd8f66b1d920fbdc672b6f8308d2c4f71feb7d43cad3d4fa2ec954855473d8a9bfcab6164de292b585e1f7b7adfa8b1b975ee6f0ea5d892cba2d1ee6b11b16d505ad24d167f5f22827ca0b791de6dbe0a46e08d705b14d4401f9eca81180a6668dc2747582ff3eb18cc1c083874809f01c4bc5eca852f9cbd2b3254e807d63e6c5a18e1209f05e884f901b77f0f88cfe9c1ce9f263c57d81e36988d9ad10cd6ee8c398a5a7867", 0xe4, 0x276b}, {&(0x7f0000000740)="801303f64ecc1688305c4fe94f4285c65aae4e6b24a171b5b6623d1083551686757a55d7cc768becc3988f671588255d11e3030ff30b5b4f98e1803b131767d1", 0x40, 0xffffffffffffffe1}, {&(0x7f0000000780)="40474953a8ab0fd747bde44c58192936ffbd194f16db0d50ecd593780c1ee3572bbae0d79e", 0x25, 0x7}, {&(0x7f00000007c0)="88e5397568422a2057987326063cf0bf11eaf1a7070bd274a11cbbd8677bd919d9e9f7e8cdff6a3cfe22ab41fc2d86c2ec5f", 0x32, 0x2}, {&(0x7f0000000800)="69022946ad9be8977bcd6794d12aff877caf715ffe735c6521c044c0f25ccffe1ebc40512615f202ec330cb8b14f818c759eb6f11038bb5123f637f9829439dc15b06ea69df90a916b4c0536584d16636205e34d0c34806ea5781641e7b89f897ac53f7afad73c7ac742478ec0f0a462c54de55d4b768aed0c8225b888f86307596716e66387dfcff759dbb066c38377f188cd66315612a19ca19827a941f07cd22caf59f2123006a45050b76f6ba8f8", 0xb0, 0x100000000}], 0x1000400, &(0x7f00000009c0)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0xb59}}, {@disable_sparse_no='disable_sparse=no'}], [{@measure='measure'}, {@obj_user={'obj_user', 0x3d, '-'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}, {@uid_gt={'uid>', r0}}, {@dont_measure='dont_measure'}, {@subj_role={'subj_role', 0x3d, '&:\\'}}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x5892, 0x0) lstat(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getuid() mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x2900000, &(0x7f00000002c0)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=r1, @ANYBLOB="2c01002efb18e88bf3f3792c7569643c", @ANYRESDEC=r2, @ANYBLOB=',func=MODULE_CHECK,fsmagic=0x0000000000000009,\x00']) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:25 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) readahead(r0, 0xffff, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") r2 = socket$netlink(0x10, 0x3, 0x8000000004) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000000)=0x8000, 0x4) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xffffffff, 0x0) setsockopt$RDS_RECVERR(r3, 0x114, 0x5, &(0x7f00000001c0)=0x1, 0x1) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000340)="59000000140019232b834b80043f679a10ff6400940005002a925aaa000000000100008400f0fffeff2c707f8f00ff050000000010000100090a1000410400000000fcff00000000000000000000000000000000000000000f", 0x59}], 0x1) io_setup(0x1cd000, &(0x7f00000000c0)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f0000000100)={{0x3, 0x1, 0x5, 0x1, 0x7e40}, 0xfffffffffffffffc, 0xffff}) 17:50:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x6}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x0, 0xfffffffffffffffd, 0x3, 0x2, 0x0, 0x0, 0x0, 0x8, 0x4, 0x0, 0x2d, 0x1f}) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x8, 0x400) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80901a}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x500, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffff7f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x94}, 0x4004) 17:50:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1, 0x0, 0x1d}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='oom_score_adj\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4, @in=@multicast2}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000240)=0xe8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0xa, &(0x7f0000000140)='!*system^\x00'}, 0x30) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000300)) fcntl$getownex(r1, 0x10, &(0x7f0000000340)) fcntl$getown(r1, 0x9) gettid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) syz_open_procfs(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace(0x10, 0x0) r3 = syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x40000004a8e, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, 0x0, 0x0) r4 = syz_open_dev$mouse(0x0, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r5, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r5, &(0x7f0000000080)={r4, r4}) ioctl$sock_ifreq(r5, 0x8990, &(0x7f0000000040)={'bond0\x00\xe1\x00\n\x00!!\x0f\xdb\x00', @ifru_names='bond_slave_1\x00'}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "a4ab733d193ae760", "3ca947fee9d3d4b160d2be35bf03b004", "c9e3b995", "7ed9294a74adff26"}, 0x28) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendfile(r6, 0xffffffffffffffff, 0x0, 0x100a147c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 17:50:25 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r1 = getuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000180)='./file0\x00', r1, r3, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') mount$9p_virtio(&(0x7f0000000280)='/dev/ptmx\x00', &(0x7f0000000380)='.//ile0\x00', &(0x7f00000003c0)='9p\x00', 0x200000, &(0x7f0000000480)={'trans=virtio,', {[{@msize={'msize', 0x3d, 0xb2}}, {@version_L='version=9p2000.L'}, {@version_u='version=9p2000.u'}, {@nodevmap='nodevmap'}], [{@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/ptmx\x00'}}, {@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x75, 0x64, 0x7e, 0x39, 0x67, 0x3d, 0x64], 0x2d, [0x32, 0x35, 0x66, 0x35], 0x2d, [0x67, 0x65, 0x66, 0x77], 0x2d, [0x33, 0x76, 0x77, 0x30], 0x2d, [0x38, 0x62, 0x74, 0x36, 0x77, 0x77, 0x0, 0x37]}}}, {@smackfsroot={'smackfsroot', 0x3d, '@.ppp0'}}, {@subj_type={'subj_type', 0x3d, 'overlay\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@seclabel='seclabel'}]}}) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, 0x0) r4 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000140)='./file0/f.le.\x00') 17:50:25 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x20040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x80, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000280)=0x40) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) connect$bt_sco(r2, &(0x7f0000000100)={0x1f, {0xc458, 0xfe, 0x101, 0x101, 0x9, 0x1}}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, 0x0) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f00000002c0)=0x4) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000080)={r3, 0x9}, 0xfffffffffffffee5) setns(r1, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f00000000c0)={0x17, 0x8, 0xffff, 0x2ae, 0x7ff, 0x4}) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) connect$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 17:50:25 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14, 0x80000) sendmsg$nl_route_sched(r0, &(0x7f0000000c80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10400}, 0xc, &(0x7f0000000c40)={&(0x7f00000006c0)=@newtclass={0x54c, 0x28, 0x400, 0x70bd28, 0x25dfdbfb, {0x0, r1, {0x10, 0x7}, {0x1, 0x2}, {0xfffb, 0x9}}, [@tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x24, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x9}, @TCA_QFQ_LMAX={0x8, 0x2, 0x3}, @TCA_QFQ_WEIGHT={0x8, 0x1, 0x5}, @TCA_QFQ_LMAX={0x8, 0x2, 0x80000000}]}}, @TCA_RATE={0x8, 0x5, {0x8c8, 0x10001}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x3c, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x9b}, @TCA_QFQ_LMAX={0x8, 0x2, 0x6}, @TCA_QFQ_WEIGHT={0x8}, @TCA_QFQ_LMAX={0x8, 0x2, 0x9}, @TCA_QFQ_WEIGHT={0x8, 0x1, 0xc67}, @TCA_QFQ_LMAX={0x8, 0x2, 0xffffffffffffffff}, @TCA_QFQ_LMAX={0x8, 0x2, 0x401}]}}, @tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x34, 0x2, [@TCA_HFSC_RSC={0x10, 0x1, {0xde, 0x1f, 0x1}}, @TCA_HFSC_USC={0x10, 0x3, {0x1, 0x1, 0x8}}, @TCA_HFSC_USC={0x10, 0x3, {0x2, 0x0, 0x9}}]}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x460, 0x2, [@TCA_CBQ_LSSOPT={0x18, 0x1, {0x34, 0x2, 0x19, 0x100, 0x1, 0x4, 0x3, 0x3}}, @TCA_CBQ_RATE={0x10, 0x5, {0x6dd, 0x0, 0x2, 0x9, 0x7, 0x9}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x40, 0x6, 0x7, 0x4, 0xffffffff, 0x4, 0x5, 0x9, 0x9, 0x8, 0x0, 0x6, 0x3ff, 0x1, 0x8001, 0x400000000000000, 0xe97a, 0x400, 0x1, 0x5, 0x9, 0x7, 0xff, 0x2, 0x7, 0x693b, 0xb30, 0x2bc0, 0x6, 0x401, 0x62, 0x3, 0x1eb, 0x1, 0x30e5, 0x1f, 0x4, 0x1, 0x10000, 0x10000, 0x9, 0x8, 0x8000000000, 0xdaf8, 0x9, 0xff, 0x0, 0x7, 0x9, 0x4, 0xb7, 0x400, 0x0, 0x4, 0x3, 0x2, 0x39e38e54, 0x7, 0x0, 0x4, 0x20, 0x8, 0x4a, 0x9, 0xff, 0x8001, 0x5, 0x321e, 0x8653000000000, 0x8, 0x8, 0x3, 0x80, 0x1, 0x2, 0x9, 0x54, 0x2, 0x0, 0x7ff, 0x46fb, 0xa62, 0x4, 0xd9f, 0x1, 0x2, 0x1, 0x4, 0x5, 0x0, 0x8, 0x5, 0x3, 0x601, 0x1, 0x0, 0x5, 0xa17, 0xb1, 0x8001, 0x1, 0x2, 0x5a, 0xb5, 0x7, 0x0, 0x5, 0x8, 0x10001, 0xdc, 0xaf51, 0x9, 0x40, 0x3ff, 0x2, 0x3, 0x9, 0x4, 0x81, 0x100, 0x2, 0x9, 0x6, 0x200, 0x6aaa, 0x1ff, 0x4, 0x19, 0x7, 0x1, 0x5, 0x6, 0x5, 0x8000, 0x7f, 0x1ff, 0x9, 0x1, 0x6, 0x1, 0x5d2000, 0xa1, 0x4, 0x6cd6ca2b, 0x8, 0x2, 0x5, 0x4, 0x1, 0x6e45, 0x4, 0x8, 0x80cb, 0x9, 0x3, 0x8, 0x2, 0x6, 0x20, 0x8001, 0x1000, 0x5, 0xcbb2, 0xe618, 0x5, 0x2, 0xffffffffffff9119, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1000000000000000, 0x800, 0x9, 0x7, 0x9, 0xfffffffffffffffc, 0x2, 0xb461, 0x8, 0x20, 0x565, 0x1, 0x4, 0x9, 0x8, 0x4, 0x8, 0x4, 0x8, 0x1ff, 0x80, 0xda, 0x0, 0xfff, 0x772d, 0x7, 0x8, 0xe2, 0x7fff, 0x101, 0x8001, 0x5b, 0x7a33, 0x6, 0x2, 0x6, 0x4, 0x2271, 0x9, 0x5, 0x5, 0x8, 0xfffffffffffffffd, 0x1f, 0x9, 0x0, 0x9e, 0xfffffffffffffffa, 0x557, 0x6, 0x7, 0x2, 0x7, 0x6, 0x5, 0x9fef, 0xffffffffffffff40, 0x0, 0xffffffffffffffff, 0x3, 0x7, 0x59bf, 0x1, 0x6, 0x2f27, 0xff, 0x9, 0x7f, 0x428, 0x1, 0x8, 0x72, 0x3, 0x2, 0x8001, 0x73, 0xfffffffffffffffe, 0x800, 0x0, 0xffff, 0x4, 0x0, 0x0, 0xfffffffffffffffa, 0x9]}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x6, 0x2, 0x9, 0x800, 0xb7d0, 0x2b}}, @TCA_CBQ_RATE={0x10, 0x5, {0x6, 0x1, 0x3, 0x4, 0x1f, 0xffffffffffff7fff}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x800, 0x7, 0x9, 0x2, 0x9, 0x7}}]}}, @TCA_RATE={0x8, 0x5, {0x7, 0x4}}]}, 0x54c}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:25 executing program 5: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x8800, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000240)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb3) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f00000000c0)=0x6002) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000005c0)="b86b0000000f23d80f21f835000000900f23f866baf80cb88f72b98def66bafc0cec66c0a0313a000000c4c3d15c1ff30f350f01c3c4e24d96390f009c6a05000000c4c249af4d57b8340000000f23d00f21f8353000000c0f23f8", 0x5b}], 0x1, 0x0, 0x0, 0xfffffffffffffdee) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 186.266745] 9pnet_virtio: no channels available for device /dev/ptmx [ 186.327069] audit: type=1400 audit(1563904226.009:47): avc: denied { create } for pid=8090 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 17:50:26 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) sysfs$1(0x1, &(0x7f00000000c0)='\x00') mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x4, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r1, 0x100, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xd789, @media='eth\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x0) [ 186.497384] bond0: Releasing backup interface bond_slave_1 [ 186.512773] audit: type=1400 audit(1563904226.129:48): avc: denied { ioctl } for pid=8090 comm="syz-executor.4" path="socket:[29867]" dev="sockfs" ino=29867 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 17:50:26 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) r2 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)='\x00', 0xfffffffffffffffb) keyctl$revoke(0x3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x800007, 0x8}) [ 186.646402] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 186.716756] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=8119 comm=syz-executor.1 [ 186.779478] 9pnet_virtio: no channels available for device /dev/ptmx [ 186.806408] overlayfs: filesystem on './file0' not supported as upperdir 17:50:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x2714, 0x0, &(0x7f0000000000)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x301100, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, 0x4, 0x5, 0x2, &(0x7f0000ffc000/0x2000)=nil, 0xfffffffffffffffc}) 17:50:27 executing program 0: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:27 executing program 1: mkdir(&(0x7f00000002c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x5892, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x1) link(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00') pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') 17:50:27 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_dev$adsp(0x0, 0x0, 0x20040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x80, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000280)=0x40) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) connect$bt_sco(r2, &(0x7f0000000100)={0x1f, {0xc458, 0xfe, 0x101, 0x101, 0x9, 0x1}}, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, 0x0) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f00000002c0)=0x4) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000080)={r3, 0x9}, 0xfffffffffffffee5) setns(r1, 0x0) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f00000000c0)={0x17, 0x8, 0xffff, 0x2ae, 0x7ff, 0x4}) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, 0x0) connect$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 17:50:27 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x9, 0x80000) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0xfffffe2e) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000580)={0x0, 0x4dbae1a9e7b7e749, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000180)={r2, 0x1}) r3 = syz_open_dev$swradio(&(0x7f0000000400)='/dev/swradio#\x00', 0x0, 0x2) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000540)={0x17, 0xca, &(0x7f0000000440)="add74d7db153eb4fdf22adab80a2b5dd8e15e738f7e2b30f9709d1c07a2073a9a51b3204a04d3d1f6dea4516a79e6b1efa8684c2c69bd33030aaf01f0cbc910ea462f324cb173194a5da9f1b4286f569c189399e8e7cf9726ab0da28a2332fd19c34da82b0ef9677564bc44d11a3d4ab018eb2ab1d4d822b47bbdcb1cfc7d27a0d3eb05c39bd2b62759471ec58efb0920dca4201c2347160a2c2b98c35c3f58c0a0ef8ce97ae0bec13273ec7ed20b0c30f9b27a0b18a891ad8aa0e986db22d9d6cb7003c866438ba738e"}) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f00000005c0)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) sendto$inet(r1, 0x0, 0xf790df6637210cf, 0x0, 0x0, 0x1a5) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0x4a6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}, 0x1c) preadv(r4, &(0x7f00000017c0), 0x199, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000300)=0xc) ioctl$TIOCGDEV(r4, 0x80045432, &(0x7f0000000080)) syz_genetlink_get_family_id$net_dm(0x0) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f0000000380)=ANY=[@ANYBLOB="080000000000000002000000000000008845ca5b0000000091000000000000000001000000000000478400000000000000000000000000003f000000000000000180000000000000"]) 17:50:27 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000000c0)={0x800, 0x584e4f53, 0x9, 0x6, 0x3, @discrete={0x2, 0x100}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000001c0)={0x1, 0x8, 0x4, 0x200000, {r3, r4/1000+10000}, {0x7, 0x1, 0xd9, 0x4, 0x4ce, 0x1000, "0083dfd9"}, 0x9, 0x3, @userptr=0x1, 0x4}) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000240)={'team0\x00', 0x8000, 0x1}) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000000040)={0x1, 0x2, 0x1ff, 0x7c50}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @remote}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0xfff6) 17:50:27 executing program 4: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) gettid() syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x101040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) lgetxattr(0x0, &(0x7f00000000c0)=@known='system.advise\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000003c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000340)={0x0, 0x18d1e37c}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) 17:50:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00') r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) shutdown(r0, 0x1) mknod$loop(&(0x7f00000001c0)='./file0/file0\x00', 0xc000, 0x1) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x400001, 0x0) socket$unix(0x1, 0x7, 0x0) openat(r1, &(0x7f0000000180)='./file0\x00', 0x100, 0x4) 17:50:27 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000000c0)={0x800, 0x584e4f53, 0x9, 0x6, 0x3, @discrete={0x2, 0x100}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000001c0)={0x1, 0x8, 0x4, 0x200000, {r3, r4/1000+10000}, {0x7, 0x1, 0xd9, 0x4, 0x4ce, 0x1000, "0083dfd9"}, 0x9, 0x3, @userptr=0x1, 0x4}) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000240)={'team0\x00', 0x8000, 0x1}) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000000040)={0x1, 0x2, 0x1ff, 0x7c50}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @remote}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0xfff6) 17:50:27 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x9, 0x80000) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0xfffffe2e) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000580)={0x0, 0x4dbae1a9e7b7e749, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000400000000000000000000000000000cb010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000300000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000ab0db8384333bf9ca1d90c20cc81b3b299fcc546f1f1e9a8c46e848eeb35bfe4489b7e65019b05c39e94b75b4d7bb9ac5e8d7589fff01fa6996215bb82119eba28357a2d9019a3896bd9683862cfad9ab57964bbb53c2deab3677d1713cf2fa276fde5a2c9f48b735fbc61ddfa2a0facf48fb6c078a51dc767a5de1a0b2aafd2"]) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000180)={r2, 0x1}) r3 = syz_open_dev$swradio(&(0x7f0000000400)='/dev/swradio#\x00', 0x0, 0x2) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000540)={0x17, 0xca, &(0x7f0000000440)="add74d7db153eb4fdf22adab80a2b5dd8e15e738f7e2b30f9709d1c07a2073a9a51b3204a04d3d1f6dea4516a79e6b1efa8684c2c69bd33030aaf01f0cbc910ea462f324cb173194a5da9f1b4286f569c189399e8e7cf9726ab0da28a2332fd19c34da82b0ef9677564bc44d11a3d4ab018eb2ab1d4d822b47bbdcb1cfc7d27a0d3eb05c39bd2b62759471ec58efb0920dca4201c2347160a2c2b98c35c3f58c0a0ef8ce97ae0bec13273ec7ed20b0c30f9b27a0b18a891ad8aa0e986db22d9d6cb7003c866438ba738e"}) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f00000005c0)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) sendto$inet(r1, 0x0, 0xf790df6637210cf, 0x0, 0x0, 0x1a5) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0x4a6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}, 0x1c) preadv(r4, &(0x7f00000017c0), 0x199, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000300)=0xc) ioctl$TIOCGDEV(r4, 0x80045432, &(0x7f0000000080)) syz_genetlink_get_family_id$net_dm(0x0) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f0000000380)=ANY=[@ANYBLOB="080000000000000002000000000000008845ca5b0000000091000000000000000001000000000000478400000000000000000000000000003f000000000000000180000000000000"]) 17:50:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x5892, 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0/file0\x00', r0}, 0x10) 17:50:27 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000600)='/dev/vcsa#\x00', 0x9, 0x80000) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, 0x0, 0xfffffe2e) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000580)={0x0, 0x4dbae1a9e7b7e749, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000180)={r2, 0x1}) r3 = syz_open_dev$swradio(&(0x7f0000000400)='/dev/swradio#\x00', 0x0, 0x2) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000540)={0x17, 0xca, &(0x7f0000000440)="add74d7db153eb4fdf22adab80a2b5dd8e15e738f7e2b30f9709d1c07a2073a9a51b3204a04d3d1f6dea4516a79e6b1efa8684c2c69bd33030aaf01f0cbc910ea462f324cb173194a5da9f1b4286f569c189399e8e7cf9726ab0da28a2332fd19c34da82b0ef9677564bc44d11a3d4ab018eb2ab1d4d822b47bbdcb1cfc7d27a0d3eb05c39bd2b62759471ec58efb0920dca4201c2347160a2c2b98c35c3f58c0a0ef8ce97ae0bec13273ec7ed20b0c30f9b27a0b18a891ad8aa0e986db22d9d6cb7003c866438ba738e"}) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f00000005c0)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) sendto$inet(r1, 0x0, 0xf790df6637210cf, 0x0, 0x0, 0x1a5) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') connect$inet6(r1, &(0x7f0000000340)={0xa, 0x4e20, 0x4a6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff}, 0x1c) preadv(r4, &(0x7f00000017c0), 0x199, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000000c0), &(0x7f0000000300)=0xc) ioctl$TIOCGDEV(r4, 0x80045432, &(0x7f0000000080)) syz_genetlink_get_family_id$net_dm(0x0) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f0000000380)=ANY=[@ANYBLOB="080000000000000002000000000000008845ca5b0000000091000000000000000001000000000000478400000000000000000000000000003f000000000000000180000000000000"]) 17:50:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xf