Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 37.210737] audit: type=1800 audit(1570355900.639:33): pid=7349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 37.231912] audit: type=1800 audit(1570355900.639:34): pid=7349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 40.590568] audit: type=1400 audit(1570355904.019:35): avc: denied { map } for pid=7522 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.28' (ECDSA) to the list of known hosts. 2019/10/06 09:58:30 fuzzer started [ 46.957384] audit: type=1400 audit(1570355910.389:36): avc: denied { map } for pid=7532 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/10/06 09:58:32 dialing manager at 10.128.0.105:34719 2019/10/06 09:58:32 syscalls: 2516 2019/10/06 09:58:32 code coverage: enabled 2019/10/06 09:58:32 comparison tracing: enabled 2019/10/06 09:58:32 extra coverage: extra coverage is not supported by the kernel 2019/10/06 09:58:32 setuid sandbox: enabled 2019/10/06 09:58:32 namespace sandbox: enabled 2019/10/06 09:58:32 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/06 09:58:32 fault injection: enabled 2019/10/06 09:58:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/06 09:58:32 net packet injection: enabled 2019/10/06 09:58:32 net device setup: enabled 2019/10/06 09:58:32 concurrency sanitizer: /proc/kcsaninfo does not exist 10:01:21 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0x8) getsockname$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x220004}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r1, 0x1, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xd740a368966c3648}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x1c}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x10}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x4}}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40090}, 0x8004001) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000380)=0x78) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) write$P9_RMKDIR(r2, &(0x7f0000000400)={0x14, 0x49, 0x2, {0x88, 0x1, 0x2}}, 0x14) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-control\x00', 0xc000, 0x0) sendfile(r2, r3, &(0x7f0000000480), 0x47) r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000500)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000540)={0x0, 0x0, 0x7fff}) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000580)={r5, r6}) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/qat_adf_ctl\x00', 0x2800, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x63, &(0x7f0000000600)={'icmp6\x00'}, &(0x7f0000000640)=0x1e) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) ioctl$TIOCEXCL(r4, 0x540c) r10 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$FS_IOC_GETFLAGS(r10, 0x80086601, &(0x7f00000006c0)) r11 = syz_open_dev$sndpcmc(&(0x7f0000000700)='/dev/snd/pcmC#D#c\x00', 0x80, 0x917306665a2a89e6) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r11, 0x800442d4, &(0x7f0000000740)=0xfffffffd) statfs(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)=""/149) getrusage(0x0, &(0x7f0000000880)) r12 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$apparmor_current(r12, &(0x7f0000000980)=@hat={'changehat ', 0x0, 0x5e, [')\x00', ':[GPLsystemtrusted\x00', 'icmp6\x00']}, 0x38) [ 218.145844] audit: type=1400 audit(1570356081.579:37): avc: denied { map } for pid=7550 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14982 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 218.266994] IPVS: ftp: loaded support on port[0] = 21 10:01:21 executing program 1: ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, &(0x7f0000000000)={0x0, 0x2, 0x7c1a, 0x8}) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x80) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0xfffffff9, 0x1, 0x2, 0xfffffff8}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xffffffffffffff33, 0x41101) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000140)={r2, 0x2}) r3 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x4, 0x648600) ioctl$int_in(r3, 0x5421, &(0x7f00000001c0)=0x3f) ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000200)=0xb, 0x4) set_tid_address(&(0x7f0000000240)) r4 = openat$proc_capi20(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2000, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r4, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40406000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r5, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x1c}}, 0x4000000) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x402800, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x2, 0x1, 0x0, 0x1ff, 0xfcd2, 0x5, 0x0, {0x0, @in6={{0xa, 0x4e24, 0x10000, @empty, 0x7}}, 0x2, 0xfc000000, 0xff, 0x1000, 0x6}}, &(0x7f00000004c0)=0xb0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000500)={r7, 0x3}, &(0x7f0000000540)=0x8) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r8, 0xc0406618, &(0x7f00000005c0)={{0x2, 0x0, @reserved="1a68e1f3912079a2bc94f04d4452202e6db02867d687c8ed845053b2ba5806d1"}}) r9 = dup2(0xffffffffffffffff, r8) ioctl$DRM_IOCTL_GET_CTX(r9, 0xc0086423, &(0x7f0000000600)={r2, 0x1}) r10 = syz_open_dev$mouse(&(0x7f0000000640)='/dev/input/mouse#\x00', 0x2, 0x249773708e21eb5c) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r10, 0x28, 0x0, &(0x7f0000000680)=0x2, 0x8) r11 = signalfd(0xffffffffffffffff, &(0x7f00000006c0)={0x5}, 0x8) dup(r11) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000001ec0)={r7, @in6={{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x25}, 0x422}}}, &(0x7f0000001f80)=0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000001fc0)={0x0, 0x4f}, &(0x7f0000002000)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000051c0)={0x0, 0x7, "9e973f712d613e"}, &(0x7f0000005200)=0xf) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000005240)={r7, 0x9}, &(0x7f0000005280)=0x8) sendmmsg$inet_sctp(r8, &(0x7f00000053c0)=[{&(0x7f0000000700)=@in6={0xa, 0x4e20, 0x1000, @dev={0xfe, 0x80, [], 0x11}, 0x3ff}, 0x1c, &(0x7f0000000ac0)=[{&(0x7f0000000740)="adefdb20abecdf89f09a85a4a7e655a34b2c5add500f89bd8991c6e778262efb67ea52fde59c1ae86138120482a81ec25255769e7f642fa9a5378fae7f6ba453abf1e79e0152c704a4aec7fec5bded47ffdb1284639e4e4b02d619d21205972447530d5d5eccca22428db1cdc5ee2eebda755a5cde00d1aa8c50a0fa8f47ae573cd17127b589a15482017d07f89036b0271c7e5d94cb45d16f73f22e2c143ae6950d99bcae8b9a7bc81bfe985afa7540be639f8bf24f8eec15a8950e6851c943ad042823a989184280bb52d5ee3a65a2", 0xd0}, {&(0x7f0000000840)="d256b952934057877d3e6a3364c4fb92b949868107332722ce35e7692422e453fa97415323e77da77a35c4b53bbc72da50b25b6031008732307ff5b5cbd3", 0x3e}, {&(0x7f0000000880)="0a7b10c9bfc4d85df9", 0x9}, {&(0x7f00000008c0)="8b09a8b6e366212a2c6fa199a880030a9b4a87a4b683354a455e3761807a497861e89ae09c16a360957a89dc36b1a9837ba5a052c368a8aa6277e75c822edbb13456b13b33fb2ef571fb7f793742f1cffbc20cacd8eba3241cb8e26b8a63441183a7ed206ac3fc6949cfec6d8319a1d5a7", 0x71}, {&(0x7f0000000940)="78546e9a1391bd68626dcd3592a93178cd61daa8c8c5e89488b009ae8491e643c6f7c1646bf6e179d0d98ed84463318c5819f46c4916b8af774a455a6326a7e5b899d75d", 0x44}, {&(0x7f00000009c0)="c08616a23c2a2807c222aa6b0cec46297bf59f4e6af4eabbef4df1add20d0f726c645a8732c13296d7b56f6fc2149dc4b0596ecc48d576eee95ed25502a13e912d5ac1330b13f8b4929db3d7eeedd2a26b59c643f198e48392a3149584c824b7ce0a4ad2d0cd73cecc5c1f3e8be6ce5078c91c0e6be83afc06d84370b49491e7bf8a7581577257c64c3fa2f29844e71b8e42d7d126de8f34024bbcb9b78738e2f7a0653d58ba4dbff249f2d4055c2fbd6413a9259667f9456d85996da2a0d87e6bd8276d4dc68ea281963f591248da8f82264fb5cd11a42d95171caddc7fe298fb991fd4500192ee45", 0xe9}], 0x6, &(0x7f0000000b40)=[@sndinfo={0x20, 0x84, 0x2, {0x6, 0x3039c44e16a4bb1b, 0xfffffff7, 0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x6, 0x208, 0x1, 0x7}}], 0x40, 0x813}, {&(0x7f0000000b80)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10, &(0x7f0000001dc0)=[{&(0x7f0000000bc0)="2d0122b17a4cfd9a97737614d5bdf4147f67bf63922452ca0b4cef4717467450e1d58c2a08ed2a9dcd19241cc9acebf2edb5746ef4b5216e660db04325088e48853c7f58cadec38aae613974703bc7c266b53f415449b360d0c74f6cb15d1c4514c1d1485d2f864617686ce7e52628d18b78a36fd9a242f276757e3d196393913dde5d21877f01d9e18329f9021c2ab4b41c82abe9f266e165ea3ee9bc892f3611b10101ea24c2e0619145", 0xab}, {&(0x7f0000000c80)="fe5ccf3d8aefcf120e3ec731b3b536bcd3894e0aad0f48103bbf2ad289930c51a957946298fa4985ac18c6b1ddf401ea1b7a0a501ef258738a2153fd681043a16972fd0599df0a755fd26d613b4cd96ccf8578a6f5b2e0aac7ed17a21bb0a49b24592277467c14a0f4e352304bd4a976a7b49a960afb8dbb2c14ecb5b8fc335d6ff0468024f71ef2a819eabec6f729d91e5757473da62f274bf823d57c7257c2cc3ea2f309c72d41ccace881b73b15aecdf41c27e94b544dfd45fd849e3e5984ff889edb04c3e041b318ea2bfef1b009def6dbd54b743d", 0xd7}, {&(0x7f0000000d80)="4f95b40924e8b40b5b59edc909c1", 0xe}, {&(0x7f0000000dc0)="25f3dd8e9403ea3f299ed91e40b9b22008dcd72ea3a4be79e98228df7958c42b1e4afc9856baf6fc347be2aa1dd10088ba05b8126579379df72f43774156a845c43f2b34e5cf152fbccfe6c1d7272daf060aef3ddb7a9da05a06eb03fda11f386fab44902639640c1cdae9e19c64a5e2ff7b3f3df63076ee776c5e017f6ad77942659c6d8eac6c514819c9a8e9ee5052ad1ea432bb1f8a05575cd3543640c8a25430937d12d2c5807606086fad9a1293d22b3ce63581ebbf31e3833d90e6d41f663101de016ef940c4a583142bdb64205f968cf90ac34c5cdc8b7c70a7170891eccbb585ced5e15d2b050cb00bde80320f48c79d9bfccbac4f4340295ebad81bffd8da11b2313948dab1b8a7cc4c2a69eb99641955566a9f7f6bf322d1a1897a70748e344ae8b9804b31df5866c06f2d97053023c127456fa0a35485ec0f487606f71f1ca5f6b716fa18b7c2781b382c6ebd41475e998332b267b9d928b98d18edefc6796d128b4ea25bf00fc6dd02b17d81c91c8e8208a1960caafcefdb2bd695b5b1fc10807e809b86b46f3c3f95aa03d671ee17e540ceea43624e5502b4022fa21f8f4d3529db2349b546df5793c60a657435e684d0cb1955117ecf7f0874cf1f04a9b5bafa92b4e4c42e057dfd763a16d69c025b91718741ba24080e2e956b334003a0be5de266d819379cbb04bd49e9ff13f4be1b62812224ff5924c93ef80671a0bbf35313e9f673677457deae98722f9ddef0d32d52a1dff9747934ac2026af13e649729288cbc04020179e0d18afce1334d28795840e12210b7eaa9b2b88b63901b8031aba14e1a1f7fa5fdd2a101b07d0b1511103c422783e7fcd5d204c4cd54b48d9add08b85f992dbd995f5c51e6a1e2b8c74d1ca3b6a678a0820fb7a1a20d7857e3c1d79b6c7cef063e5db4ec71676471d75b0defef6c5e58459e92f0a56bd2c15fc9ed0043a7683b1ba0c1fdffb0aebd683e10e4db2e8fe8f03714ff59a6e4b90eda50336aee2746107ef0f5cfbd92ca871ff13e54498dcf73fdcd78465486eacd98a50eaa3135860dcb41066fb232bc4b53f392d4f77655d58eedd6611e6ba3f91698a92d2996cb89c6a35eca722a7b385f76d34034d497644e09a51310bd83197d3d6b60ad5d89a9442ad20b9d633a64f1d043b675728a88bd9ce349ce81530b29b91bf1d008bb1b9e3f3265235cc64535efa3e3f5ccf165fb50422ce380afa2cc3bb6beec469e9b9f68465a12cb5e85818c3ad579a1b554a0a83f96853d8abd7a6b122a12ad7b7a0262b9ddb481cf41ee072fea2d716666addfb6b6d0d2d5d188e67a17612fd11f3172b7769f0405ec76358a92cf3039b9faad3984c0e953a78dfd11e138feaaf0d843b6b841c76ed27f94f0026890e4af7bca00c6c7b57ad44f8b38222832e86fa154ec69b4a883d961ced9e3fa5c85b907ed4a0b3314c06e7fef4800ca60b2b68be62124c96b68558e77a086151a2e088bc6fdea2611d3a6869bb9c39814bc0b15bb637538c9d49b8d98dfabe18046d05c882b1c07833150c27373cd8225be6f274d9e2295b0377b2d4bf911942cacaa9c05593e24689df4e4ad262b3973a7eafd2e5a100bf0b384ccea2b4df68f91509e0a5974ceb9f477023d803ce6e39296ef9d8972e3bda6d30e6b8d32e20d572e329dc659e934b37af33c113f69d37f4907af9023b1e5f3f60dcb0e0dff6df5a313f6301c2b1caee2e52e9513b08cd999064c93eb7789a0a0b431b3b859d980aab879e5b420a9bb30aa0af17ce17edf4264683b782b499cd5e22f6aa48070887702920a583c75f85dc66212715c2578367af5dcfaa9e08d0e7f54ba7680b360e9cb7b4fc809827a42a5c1e28ebd6b3a9d098186bb8ce0a8f397c4fff3416788b9c89df1b7fc23877d408c3300d1779e021162e7ed4eb3ce855465486b33d80b4d5cfdaeac8e39a95e03c67922b85fa6735dfadfcb689f90ed6bc7ed6b0fc0d7f5e492316add9f0a30b2284ac8ab8028e58b7005f6e7f91ee65755f3f5bf617c4033c2d747f436c8d08c2a6d6d3bad18e56d64f2e9b6bf89f95a9710170c6b396a9959dc73b46198c021c479fa548df9851b6a5052d789a2206f20041ec565d17a3135e31918f2472b1bd66bd665c553830d7257aa35ffeba937c9f52efe57d58d122b1f0c5af12b15bc6c36cbc4518fc9e9ca18995c42527e8340f4e1a195df62d3b47aadd40d880b0b8135e3752bb4392d7233819f7854e9d7a5c44b2f920ab6671a485e6107c4e87edff7183639c73a0ea4f7a660800ce94c1a703d6d572095ff6b6e2b020f124e74ac6612dbf68e87338e227817f68f37d5b45c8e3cd668323a4be4f5ed4c461789258b857fbbdbfda158076a34b22a87d981d42c58f260856da68c1d8a2959e169cb13762b7dd0939dc1e56d083bb1e62c853bf189d857b4fab6a3174244a46e9680c2498ab4462688f379e86477e655aa5d027089e5de978f74ef1f1cdbf0a46dff6ceaf2680cb107bab8c6d6cfd55586a9094dd3bcf39610d3cc40eef96aeed559095ef26d90ed3ca24ed0f25ef738d0ca6a3639ca04a3b029d633b5fb25479d2864b56e8b2ed5bf679ff23784be4c4cbf499fccf5d66cb31336642b4ab90ef4d912b5ca0ed47f1e928263a80ddda717e9747788cea0d9dc18fd242c68edc35b5e8bdc52e58dab8bdc56080b8f1d91933f22f6c63cd059f273463c0a82392509b83309e9776371b3b10761e6863feddc7928dcecf865a48b9310039dbc2f6b140c92a5a3f70481e85593cac158beae46b236575e26cb3d914c7e7396a199c5bc95a7f441305ba5bfca821bb6d332102683ebc21a62aa2ac8ca5e47776eb8a88df515be00a2cb5a07956bc7183bb2580a61e51c5c6eb83083ef02ad0daf90517fe40644fafc9250fb03bd72f068f2c575f56015ba3bc83a47091603328b1f18fd5ac4beb4235f101e107cbdbd582b9477a1373a1b4ff5601b9280b8e47eafca22a885af652078e3ef0abd7c5416e3f0d8e9f8010d9f8bf69a3daeed64c3139a035eb548d918889a93e4a259767ed7711450303d6232586160068a3a05939a1922d92298227a760ddc25f4e5b46f7c10cace0362abf42dda8c0c1f7879ab7ebecdc3915f06b4227449734970939aa56b85943a000cc48cf3ed467095d9e397235abcc5125ddcadfebbc3b4967a25e96f8a1913e4cab96285f194b06f580cfacb35a2095b7de6505b82d03492f9a1f6823a52117ea06128390083a2f5e0621d2c232de8109a3d024602795c0ae8cf95bce6bbd5902d42b19d179e1affc7a4c78946383efac9f062512db0e18a7b28e0c9660fdb4ea492baee84fd2f9989be0c9993d49c399228010d2ac4696788c9c426632bf6695c58b689b7ab4b9c75cef5c949d238fa7eae8cc898e90ea13c5c0be4547d84ef02ddcc48c47a1868549bc674998905aeb8911807d90ff8b1bec3dfd6c86c78ff8df8e72921029a20206d6e60e9ed83cd6180734c6d0e6fb77647528698424b1a2da79e0e8d46a765d9715e00ca01609cf59a7018c0335e8c24e7853a627da38b4f3e36906201ffbf18b34ae327bd230d6c3e2b2646f906a6e587ead7345e7ef653e38adbfe92d3c24f291d0a8edd07c565a4e3109ea44e744e9f1053de69753637556aa39280fce2bc728542529ea026c078f8615799a9c1d309b4fe1d320a595d742b2b1b8c0868e923d16ebe8bbddbf17ffcc273f0c447c54c16070b88f0e8a85a6884ec3d716707291b441a7960e155feb9a19d652e4c0568847bbeb9f7f32636d8c3c1beec412c5b64f94f192c491251fdda694137d5c080303e15d0b320eeadf123aa69b8ed305e8df28f4e1bde1006ecc623ee8eee47145e375ae1fe916cfd771d7a1bfbd48a89d165d54d8b1432b64221e33fa01de4b0e272510a3ec2cf4e0bd02f4a7d641fbef0a8138505c605b53c02c666e7a41e94c415b13b2fcf019a08a722566170525436b89ac5bd75ba7657d45f3813675cf49492aec8dd1489f2a8c0670f3a1867e5c26b10a37bc302d544166747176718a5d20f6b66736ad032feea0617f901deddc4faa0268d783fbddfbdfb501ef20aefa60bc0d00a6e3d19a90d4616f6a4a9e2683924e3998b25baa07b0e38485a26ace601fff0098e24178bc14fb864f5e0dcf1dab3fdb4c1f39897f684b349676a1d14daf91a67c0dbcd3072c798dac183cd29c412a21a5548efbb2bf813d131a70484f12e75b77836c69094717f8af4ad4cdda81993dc6d3ff9b61ff688bd3820867e35d35a3c8de1ff0f069c0b97f4b9bb258bfb56a8f763d755d4d0180c2c27ff95b9148c7493ceecee6d15509718118cf5be033508914f74d675b5920de7c7a4eadefad5efeb2d4884e52b069dfce8baf55ea40f65c2aefa0b6903b58b5effed2024d8b43ecaf14975b6285706301a539909cc8e73efa90b5935e30cbeee89b9a509592f1cd16bca89ce40df125e2b27fa34d8d8956013103a47a1948b4543ba4646a2aa19c0d0805e32fbfb2b04ccbbef38909016ca072c78e35af98a47ffa5db0f0cbe4702362ec3b3728d1c328b3b7bc356b6e65930d88fa4739bd0900da9d4254d039ab2afa1749759797ae86ac248af6a9f671d66e0782e099fbb805d31b89c52118702a408cd87dee2c9e983957fbd5eff934eefdfc96847d3d15884f9e93b5cae8797a5650b004e89053c8ab5f21507206a849aaba3024b944ede3c7fc4509ff1d6758ec6825081a1669861a90ab02c75ea12917f6a6814cb2482adcb2d5658e2d22510bada3ab37129ab1df09533b9ee8a34803d4c4c2d000b24c4ee795a34fc4d7579a1a28b9c548d0142c0723fcf06a4c757b3aee8f654466f52bfba990db5ed2f62bbe09146ebbce32b162556ea2e7d2c9624a6b58a136233aaaecb5a9f140af70cf6068f0b53fb5915b4907b259a3686b005dccf03818f271231474c9351252372e9d5d5cb6a407a8275e30908d68eb06d402c82df91c3a18540c4489f742d9b24f2b1c7d66e95ac5d5f1c6c8a06d38aab3bff423b184a33f6a86078c7b6b07f1c105290f122956525aebe0bed7703c077508103141fcabc411fa7209abe98915b2b401481c698fc1b1a17ede47c5f066f44d688e94ee9971edfeede1a5903dc0190860663accfee3dc34718acf1da360c668faa52cfad41aaa3a9a9c02e7259116eaa61acb4282cb1ca9c7c8f4d8d9cea5027682daa3c44b62daf6d15bee1d21fdc98c9ef94512f1a580e6ea863789c297e14e456d23abcd04b3b0e1b18e97e661bdadf1c80438c9743b887d912f3a402663bf98bba328512babde99a426b924149d42d9e15efaa5f1c76101538c13843ad21876a56af8434c8cc85a312976f40cb83188dfa96905d747964d8b64e24b7ade61cb160b69542285e292ac11919a96eff71df574ad57f727bc73fbe0ff157abc4c62cc1c2930ef9c40b0f7829b371fbe7ea7c8ef8258e89bf11bff1cc0f81d35949b43d46f63dd3a679ff6b7ef30f3ccca56bb3286d2c8e9d3dddbd97e3bbdaf8ddea450544d8170ea3c734997f9b0766ce3357fc37f79cb8b0da2ab31d04c470e605eb92549c761b2c6e55b31c537ca0a9198432adfdb0ddcbe30fd183418a44bd851416feea47ae67417a889946f3a8d865808d58ad658ee4ec955d69bbb257f7df27b5186b109dfd7426887d55b4e1c85e18cb855584ea8cf03f19c355e032ca71d485325a19a573d5f25823e4244e78631749daaa6a1fa6a4203f3d83f7810d2be03e414f18cf0878d3bd4b1ace2ce16", 0x1000}], 0x4, &(0x7f0000001e00)=[@dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0x38, 0x200000d0}, {&(0x7f0000001e40)=@in={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000001e80), 0x0, &(0x7f0000002040)=[@sndrcv={0x30, 0x84, 0x1, {0x6, 0x6e, 0xacb6239abc2f5c96, 0x4000, 0x1ff, 0x917b, 0x6, 0x58, r12}}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x10, 0xffffffc0, 0x2, r13}}], 0x50, 0x4000}, {&(0x7f00000020c0)=@in={0x2, 0x4e22, @rand_addr=0x800}, 0x10, &(0x7f00000023c0)=[{&(0x7f0000002100)="f9a68784dd75e9e71a20918955aadc41a25d5682acf9daea5496ec69d9d7f7cd584f7a0a81b7c87bfa156b7b8aba331cc7707cc4dc62ef39922f", 0x3a}, {&(0x7f0000002140)="8e2f8dd797cd6c447f99d15200cb4ebe6dff1710dd577a5ef78fd896286b70cb212d08df1dfb7ab04c402449ee8505c906eef2bdca3636af199ec9f892e705e6f088b669181644713048f845fd8d488bbb312b924a7912264447e770ca8068709d62392c6f6b07d453b825de1819ead3ff3851581052e636b17b07b5f2ddf514d206047d01b1a6ca5bcda87ae1ca57afd6f99ca6bb0d5278ff28b4bac66a4c153944ac9c4a507e979c67bf333493c29e05e4bd0fd0e23fb72fe1e06df7e2626939", 0xc1}, {&(0x7f0000002240)="280b0d5001d6552a3e4ac3f3665c1ede738cfb9b86fe7e5654ae17e25e7f6618fa4ca54c01cf75a67a156a5b55297d7e612f524cea3e9dd64931f05c1672887516194bc8cefe2498955be2590ae2552e71ef0acc6901d81497e7517f330ba9bdb2d8c2bc62eb68180e383d2ecf0542f96b0e8308eb20f2d02cbd9c1094a2b38fe802726cc49731c15a72173aced65922d40908cabe4876ab1c16904f5e8082bab177472c09cdb72158b6f72c73a5399e599453", 0xb3}, {&(0x7f0000002300)="c84918cb146f719a7da5fd135af365131ff79ee259d07344f75e4e7600f0ad270de9", 0x22}, {&(0x7f0000002340)="5eaa79a8d508eacefe285034b67b6e182cf67d1827881f8775c35d4b4381c4be8c8c80bba85510dccb8ef107f30d5081e29ced6a637d178d5cbebf0892a449d069428ba842f479428c568f4d7bbf3468990e80fe2c88ef3ddc3be8bdfb08ba612ad09c98adf6330202", 0x69}], 0x5, &(0x7f0000002440), 0x0, 0x4000000}, {&(0x7f0000002480)=@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000002900)=[{&(0x7f00000024c0)="501cf9a5213dfb5c74ad07143584bb974c3ffe05771115259c5d917375903ad0661a073ca7475743b16a230bacdfd45bfe2960fc9634a66a5cadf1f0414e8763909b77766ad5fe4f769060122cd53ebce264df8cc882185a7c855799d344a0a5d26cb7cf1d951b5d635747dc34c373922f0cb2dfa3c94a592aae107492e83039a56c0b76aa2b258fd60bf34f1b1013460fc0ff36e3dfb68f2faa88928ff4db2de93c635c6b98bdc4ddd9cbfa3b478e4795a7f9d102", 0xb5}, {&(0x7f0000002580)="a16b6c1424e1e929673ae95cfbf9a762df31634f46f141b50a4914e50c49a1ddbb1d497d0786da43fa1bf18eca59660e8eab689035eb32e3498e61560b84616c88a1b5c2d1871fdf3e0bd76d472ae82ba8234f89b192537e33a771a7bd039b7bc38ca854b981868b0cf2ba146fd3663ea31abec1c5c27a796d3d64382d035ec9cb26803d5674aed37f96bebcdef03e88c08a1fe0fb0db7893ca4325ec7ea0809f8334338d4e9372924fa7218caf7511e9c75f0661cdb30c097a298746c2d29be10f3404a4fa0880bc3f16624f7de9721b24c82197d5ca779af50882107f98aa51291bd6a96471ae1", 0xe8}, {&(0x7f0000002680)="b62e10535cc9ce031ce6f5a2fef633552f71da0a574283d7df", 0x19}, {&(0x7f00000026c0)="a2668c46dc2bd3d898e0ffb9e214148f1037509b89c659a4210bb4394e1e451992e9c1c583fe393f1ff5e3a569047c4a388f3d9db64d56e5e7c93601796d017924eb3c9bb2d8ed204fd7eb1fcd502d45dfe8d0af213eb06c73d3ea17c8cb3de9e2ccaf67a50f56121c79ef15979195bc6e4807fa757599a402d65110f2c3c82a9be3e2e57e6046064c5682eab75b605d8e6ca219f53dad7a8263bd4015ad7bc308a5354a539cc3477db7004778", 0xad}, {&(0x7f0000002780)="846923ffea29df1ded7b2ee966f757ac97db9fdf40bcc370db2834ffec2924fc863423edfd599d49f4cea43dc36705c0371426c6f3f70648003672a4ea40d404fc45ddbde238466acfe12067d761869a746bad0273c48d386daf89600ba2c8c1dcae186ce9a5752d0246f0744bcb454d347c42c745b4ebe97b2dfe04555e318b", 0x80}, {&(0x7f0000002800)="f7a862b5c86fc97e75355ee0aa3475f29a094e0b1bc3c195313cc1fb480ecbe40e9e172cd6c1ba43ff43af3a56ac1ad12cab1ae5134ba4373a5eb90df2f32ce09573eeb133cd39c36c1c1e6cd9b68a3996c5cedca832ae3fe146ddf6ac742a4539f102c2b38eee0c45bc3e7b409b9a4410611f25d922a6b346f1a800f9f7af17dd0756373e0a0a5f5401f9431a8c7724376fbe901ec0073aefae2972d01ad43fd70c431a8d3c02a9715560d7f87c1cf2dfcbed97260a7eee8438d11f8efcdc46858eddff10413479ab78d378fe28f7b7f587d98a650645d28784b39147321703226ea0ee4b4861efd3", 0xe9}], 0x6, &(0x7f0000002980)=[@init={0x18, 0x84, 0x0, {0x80, 0x0, 0x573, 0x7}}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @init={0x18, 0x84, 0x0, {0x8, 0x9, 0x5, 0x3}}, @authinfo={0x18, 0x84, 0x6, {0x6}}], 0x78}, {&(0x7f0000002a00)=@in6={0xa, 0x4e21, 0xfffffe01, @loopback, 0x7}, 0x1c, &(0x7f0000004f00)=[{&(0x7f0000002a40)="05bf061e00de8558a3d39fdcb5f16393ac2ed029b1de2d719969a468f427efe31bb3c47268afb94e47571a97b1c6f712de22118b790dd996e9845b286c4a654e118b98ac0dbd7b122f91e2c5a616bcec5e6853b8fa1ff7e697b6b262947199ad086293f511182db377540eb4fdbabd38534a66e4bfed61cdb6be66651f36e71d78681a8ac7bf0431b39427343126992152257cc7417bf1680853fc684cf6a21f67f678e0342e397edc5f2822d1f643de3211ca737c60dcfdd4a8b107a7ba129601123165848d8d71f768a9d2244cf85bd5883fc66eb1d5a96fa1745866174fd96c2386f3b2a5a3fce3c5744a4d6a3de7991cc6", 0xf3}, {&(0x7f0000002b40)="a3174e2d4a4cc708fb66ae9ff20ba735bff159a572c7d0c4fb0fdeee3a341d0433e48a2efcf2c6ac9ac649759e99a727148b52439e195b8f313eee367785089aec7a4a9066e67bbf650e3eb5e3ccce785089d0403075f999f5803425d73de4471b341f22850fa63c8aab9e92368c7c673c1652706d3c9c2b36678ab1944134f35f0aa923c838fa36abbffb07d854f004a99f49f65901a92f980742518ac03d0db1ac31ad8bd74b", 0xa7}, {&(0x7f0000002c00)="59912f8627967debab23e0738c836660af86b7801b24dd62f0ac79fd62a90387f8bf4ecc1deeb63cd5cc24cefa8785002e281cb05408c55e9186648618aadad65be5c97340192aa8216dca6c0f5b9f2963d12acbc63a29568d2af88c4e70d9ded6e5642702ba56504222b11861046cc4a4457f42d5b228676318a3f8cc35933b4e6fea481f869ed05c9db7575f66d2537d5b07dc6642833e8b32e405e47e9c15965193bd1e7c2058e8e83e01f83cf8d7fe036ca440f58da8c71ace2e2b558cfb403b43d81b6aa0bf08bfff3a000acf36d96ebbe76ba9d9d680f7d961648c0f521b4e23fdf1ed42a762c3ba79fff249", 0xef}, {&(0x7f0000002d00)="925262ca9a9224a41ec54c0f7ea993dbfe977eb820e13d147232ee08fb8c58ad4a2aa61e7c14a15d8675e525306ec2437bc89848d754b7fe6176b81fe257d15fa30db97ebc6cfb3c314304e2a4fe6848b2e370583a79f3b9bb96acb2cc2dfbd7ac0bef318233fc1ed61663b17a071fdbb25ffaffb806b6b64dca82924e0bf0a159e188deb82bf8f32a59d2749b6ed6d6ab03cf62241fcf0deac744c59068c38d3559f9f42f0d71d1f51d6fae3f3f76034eb9810a3f6604007c3270226636315c647a65c2946e853335050af3a3a776f00f14daffe6e64d3ae29ff226646ae97b6f60dd4f4e2aed05b2c6e79ad119ac7808630e7f342b1a1e1135f195cafe8892d42b97dd678d37c8a9353864018740c5d960cab2536bd25519185f4290b3ce6a18e3df9aed4004c323196e78b3991e8e3ac691e335ce850e9a23a01c8dbb205684afbcf85380777f375cad64dfdd5eaab49411631e0563543edb739de9e750f309eff122056c267e9007a5daa225be2b5ed3a16c1c2d56dc916299c9122a8dd75bce83d762a9b230b4af74861a47cb3e6d76d03e1b8df71cc124e05874c996f286ff0c95c1b5a6339303711e9ceb4e8c017573239c517b3b3d05790fd7a311a1cf15f4ab61cd91fd8ccba249003c1b95846634bc12d691364b960a76b748edf533e5c702664afef032aed48662b3d9d4c38ee77b1faac8a55c112dbaee4e74b3546ea692bec05efe24f5b38eaa60501c50f2a8b735507576caa172313cff8bad6a1956585b1b85a183456deb3dd0ee1243344d7f59f5ff03fd24233eaf8d08da76a5706bbab5c65f70feafb06ea8094353769dfe9fb54431f9374ef6eec2eaf0fc165eacf542aa821a8aeaf1467cc24e8b87a81203438199b17e0fa067fad2085605f21d81be8bdd527788ca38d46d08a0f4175a2c19a814a66ccf56ddeca66e4b27f48cab16ca2860c6078456dc1248d6f658460eb46e61c940b53d4c98c3fa97f0a7f557986f5152a0b7f416f77ec400c914adb11783dec70f5ef154f0dd74770d44ede70ac9bb8f1d0aa5e48e1e98f80248eb223658e9b8767464ef25410f2dbc831789917cbec3cbc06cf96452c36dd578e6f9c3c0db30941719c4dbbdb497b5b53c26bb83aa7cd49516d8b2f09bc245183d3ea9566840766cd255274b5e7320839baa47fab2cae4bff4575b05103e8425a497d4d3d794629479aef73add6feb53058bd77eed67329c4f7e2f88c350c7c9b217c897c49b79cc7ba415e7db316a2295520706a5b21ff7c33a85890ccfe8e927ec06cd2600f3941685582bf2b85cec6adba499e07054d0af343b975b025d8a13920f6b0803d363f16ba7d01b38c8195db33533ff696e1a58630ac322ce385dc423ad7501b4eb6ac91fa4ceda9283a176566447378e3b9579381f2f4beb474c607ade278ae070767f6f7a80a497049709a0c869ecec299510503db24385a1e01f6805ccbac43ddb97100a0522d86180dab38ac04ca6d2dd1856df71421bcc71c713b7f2ce41864a4d5ec5a8238189487f873d9a881614fcce862ffb0fed5a9ca34673ec56c3f79ead43cc0e597fe516e464f5d2f8cd47f03edaff148bd018a28955014d488fda63d84f0addf2dca61f24ce9d691b0909650a4c93282b107fea7b8a510b03c9d65da6504260ffb23f53a3dcb2653d25afa303be8f9c7f68565b8c201fd59217be4abf711f2b9371610a80553c918692eec5aa6d2ef55ba3e0da1ca034cfe47e780f825335131a27c056de82ae8ac8793cb6a29e8cac6ecea9dece90ff78eea35d927265df8e7a73dfd3f77644078850e7f4cd5c81c3579bf04ba6bd0f2a332ca267e1a8143849332c9637b8d8571e5a7b31f18f8fcf06ecec0e32f13668875b05c432093454e94f60b959d2dc7381ec4c2c2fdb7c5ea126c9746ab5e02652ff8b79ecf3c83e29cc70712634c231b02284649812968f7b2ef8cb0fa725d0038ce461b41a98b3ac408655c944d9acc91c24f03c8a3fa69f38f5e35ecd2405aa9175dbba3198f29b4b931a94c28503d5e889cbb50155539e84d8e4ea77b089fa9fb92952fbf96d0c6abb5be7639e0d3dc4b30ec9eef9e27c5b3b142149ed012c005f6a69c0550927c5c6752c24a6d98203753b4907dc42e20211e842e54fd58bbb0d533cfbc97e65cbbb14ba7229e0e942740cc7aefc3b91d8fef26607e24c0b5bb3d860742c9dfb1fb44dfedbf10e93a247fbcaec6c36068290f1b9e52ed90b0ac54551965d69618a8e636596396ef6c3f07efc5238803f309bc03337fa6754f262cb9ba95c21f6a5bed215331fcc137c959cc929a50bc3caac90da2b017df5edfe1b74a318b867dcafd27e9a687177d569fdb8948cdace78b24d688136a7ed5067724f023363272880746b9b67ad1cbe8e4362ea2da7dff6e7366107afdcc7cc87360e8110aed2849bbd49df4aa8564290f803510f843e240d45b1e8b0e69d17288b5dd3cbecbf237a5fe2bfb2080b356569b6fde88019a6af41007e2faaa258611c8b8c68dcf52256b4c5f54b8dfa3a5f1011cc9749e7bb264735da48bbf7a88d337ee6da90acf3e27f48a39868dffa205e468e698741dbfad1ed32abd58c0cb1c94e00ff875ec7d96f736870f65248c167e4dd43cc380b695cf4650f2712545663e4dce0b3f41f049337783e82b83ce62f271d6cb3bde6f16490245d52f8b6e37644dd61ef3ff061e449b28220d7711fefab03721ea554ebe1c3b503f0cc7c999c06ece975292f310b2045f4b893397d964dcc60d489f09deb2a4cc2baaca8377a372a28567350680d6b24395fff4b302049a5118bdcca4fab656eb04d343ba345139b05bbc5c479d68a8a957a03c20865169c796b24b407d82d07c55d9a8011209a4fef84ccadc14404858205932b23171de1e00761ce07402c757f452db463b20b0b39a4b3a3170dabd4e78580abb6572277c956ebe70804c836a4c5683f648a1e9c98914d075126f5940b2dd90248fbd12b43e2896faf1c55c33dfbb2609bfe63ae5ca898f42023cf1d45f86a86611d12e017728bf3126a9a19c549de6b1546a353ba68d37133ef408133f1f540b1ad63b1146872d0e11aca778b8e2a9db67086086dd4a833b85078fc23f9b4bdfb96ee3f6d29a5c5ef65431aac48aaf6051840aaed577948c2b21e4918d536414401a4dd36ec2120e042396ca12e4cfd67a5c3615e79688b9ccd45cddf27239e385bda9f76d4347812e157c03182cb6a3457674a00a193a529737495b4e11b29c4740ac8f6cf7ab3e4224cb3614ad21b6232992d8fb38bfc8b5020761ed687bdad67041b9077c8c0e8c8f65cba859da937132bee64887a6647ebc47b3eaffbcda81b87061db137fd4851a5253fae853b1ed48839073905df247411a05138361170adcafbf74464be3c56fd17d93ca0f8badf04ec71c4656e725a0d3281a543feca5cd50ddbfb43cd432122eb56c0fea60900ae6338722f4b3f55823a6eded6ec059a4dc9d5a6e0118facb68724364e0a21df73cff26148aa5826de819d648591262c36ad5daa3d6bac53d77c9c118c1ab889df06cc75dc820529f4bb8c79a06bec12a9368003ce536d608348beaca3bd3a3f48c3159f03668332264b79c5bc48018223c81e8a91319054bf364f608953a3fc9e331e6a1fe3c14f4686126196023babd8aab96b7ddaa8f0bed1c353112b03c00309d7553b429672538bd7be47a60e4eb0a459883d813f75f289d8d9300cee436a778be95ff8424cd7272bd2daa9523cb5694069070c2050ea90e67eec99c47cb8049fabe77ccce72ae59d5ae8574fdc57cd435cac6d733a90b2f8e9e4a889e8f86d9e280395f339b52d1930c246a2da2bf146c2e2de679419c036203e72ea6849aa716d9a01355ecafb808fbdaf2833c08b417e545a14f23fa4cb7bd09ad8ca80f015301c715aedd40a6d91513ec71b3af36e3e45be9ccfa1804ab71656db721b160b283686a4e55da642726a9e53297eb5ecbb65f3ccc64dd39424bcc161412c111f98d254e4ae9dd80c86a2cd5548d9d51f408b0025fabbe7b55f5efda8ff0d362322f71aa8edbe9ef8e6f24a87dd6079de0bce4e23ed33850ea2297bfe7598b046ed2d67f5b30aa66bf402f580f80b6146059d431b8e003971fdee3cdceb6a441ccb65935c41c608666e3c9901c897497b676bd045c343e56a3a031f6a7acabb56bdc3f35837b6cf61f3b78cc310ee161fd6264be7995ef4dc9f6be01b2b14332a4ba1065379356af96c32af1fb56340eed62cd7573376a3382087778f2c20314fa7edc6b52225c0490f799af6aed75cec59fe60927cd92bca6b385b3e767f73659e8a85141f0a0f5f20a31bf1293cf1bdeb3ac6335a6c82dd907c8b7ec7f871173565bd19aa48ea3719b6e2ee97ef8abc5d037fa7bb2b3ae999a05a57344ea64afcc2902a19b6486055ca4a1051368d39f175657b2b367c4b9ca32c8acfa17519e27251804a39ad4bcbeb2afe213eb63ad71ebdbbb4ea5a07f447a6f21f2b2acb65e95f936114129a07002ae8b49623b09aa60d841b128a5b789a3f5a05d26f9fb7a90242984f1ba3b2e1116d1b1f2343933f02684bc18ea992ffa5d02e8879007ecf6898bec089c7b648bd1dd094559c3257c2563d091ce9e606f62cd8b902ebd552f9be811913fd2078d654e6f9638efc15600146d41daa2db80282ef1b7685efeef29948aaf25b8db2da356967c536487df21a2de041309e938e843ad3ad5f58ec7025fe55ed119a40a5bf3e523aef6b907ab0594e146508b48ead6f8804bbd8ce5e6c7cc699cb3bd768769227bde590bb5f60cb9a00ff77aca6bd2c6741b670781a4ad8d278eeb53bf75508858e307ed53e18cd1eced1078c4d6c2a335e4e0c2b026c598df7e0a9c29ceecbf44b6a56660e5a4f49ca71f805a829f5ebb945a8b44efb42ba0a704dc3211dba7fb07a6d05cdf0761d5dbdcc2ddf8705cb651171fb34b673f12c82ab88809edc8fce7f9dc2eaf699f83187b5f325a98715b02101c5b4031d45708a268007bec321356a57a597bc0266844e0140e3511ea1502051ef6d98b716361162ba7b1371053b4dab3bd58bf83d8791c76ecd06499c9210d84ed06b5098d9ad634db344e77bc2848b2f44a39ba18e0d9811cfd1e070a2e1dd32469cd51a9824dea2aa3c84cb755db93961da46a89005039615def5058d5c6f15cf7f6bdbf921a3929ecff91d252cf036ac75b75aaf096b41b9bf4e7a9dc3963cefe961b756e887ea7be55bb5efbb518bd3be9794769080041ad03d723f482de790281097aa1f3c4315f9608324abbb0d2f7a31bf05a7147a4df1be309893edbf86182a236828a9f72b01c6bc063c2f2fb7e9a0cdf921ca527aa0ca065b3468fd554c0bab933987dfdcda3fabc64ac70f49d016a7a1e92465da0d9132c0ed1359e8300b1d0a362f12adfe7142e5e35f5358b95946c0c811088baa9beb05b91c13d4944b82053eda858b9e9a9e38c4689aa50d756c81bfb359798bfeea6698d784eec5bcaf9fae866f66b5cb43ff9ef63d348c70f3c4c5dce1259958fb50654cabd2aa8538031eb7decc7e46bb3bd5d96130fd5fac0c97b53216d9a3a77d7d19615baacba46b49491001f8128869085410ec4838751c5e9c1697eb6e5f70c88ab0f84f84305fb267e97bacf8fb57d0038d475cc2119721cbe3014261a1399424d658084caaaebbe20bd056774c6117682bd75336f8f470b5f7645634240b1368329c107697aea2e4674146951571b29a7757a495d51d8b3e2f09d2c5f9f06eff16", 0x1000}, {&(0x7f0000003d00)="2118efac4682948c41ad2ef3e14a5e4d69dbd7630f9ab3cad65357de9409ccaa85c86c5191a6673a6a6ba37c070a6d8c7d09bb32002e12b34bc03a8a1d9ec352e5f6a73fbb183dad3354bd3e6e41f02c40fda0ee69c184571b64508e64d6eba3a705278057f5979f9348fca02136cae80dcacb8c85e4161ad8cb1324a9cc809539596fe56876fe54662c", 0x8a}, {&(0x7f0000003dc0)="04f74c59b2045b18e2e169b469473b9aadc262d099fb0147521cb6e3bd2901ec8a3ef7153563497cc771b28557c7e6d20cb237bc333ab46ab2fb6086ce2acbd04b0f63fbb31afd9ccb1ed01410f7535715390b8de17b5b31dcbf0b24e0", 0x5d}, {&(0x7f0000003e40)="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", 0x1000}, {&(0x7f0000004e40)="6238a4433d4263699e8f4f8aec73d85e360839c5cbc0f145ef5bdd9922123bcdb64d9f3deb48ea99200299b1816e193cb387a3f7e8ea6c36dc5dd3a18d397d9dbd4e7fc49ba95d564e214b15baaf9d20823c39b54c83b26c5b5c73b83ae22c8fc97ee802f165421b834c303c8701cd5b1cd0552bfad65f807ed5480d580d7d53156398262eb9524736f0b19209bf9fbd2f01feb11cbd546cbd3efc89e7cdf146882fe001e9836c69eb9013e5cf2d600f17c74762", 0xb4}], 0x8, 0x0, 0x0, 0x10}, {&(0x7f0000004f80)=@in={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000005180)=[{&(0x7f0000004fc0)="ca0cacfc1b3e31fb25e4d0f60ac2699014e1fe79db2a3b8781c5167a07d1cea56b7efd8ff2cd188b68ae0f994a63d39a2515c4d02a154679d1b3a33b731253b9ac3fb99c7aed8c63311ce547936e601c5f84fa7a3dc8a9c84c9a478687caadad3dd3dfcb9139f771d5ac8caf54b67e6dcb3129ba550192c558b975e8c27483f1def4d340626832a565f3fb33", 0x8c}, {&(0x7f0000005080)="8635c9e7fe46aada9b0682facee14137d8d02ca9bba5b5671640581bbb7c07cf880b4ac749b7d5688a0fb1a05a51cb82e136c814ae23fdf128e133782b11f09a293ebe72ec2bc6cae9f7305748fdf61bda27d012cbcbd27d02b1569de7c11ab4cb9f66d59da5cf7594a3ddbd8d31bf0bc5f2d00193f6bd4ca0b08028504605807925915bfe7e6fddd0427a0e48d83416320b554ba6d95e21004ee7b2d56201fdbc84687fa014922a6cb4c3a4496e69e22d2b360abb0645e55323b0f0a26a0c2cae547a4efb5f09405b8e757e09b8e4db7c8910b7", 0xd4}], 0x2, &(0x7f00000052c0)=[@sndrcv={0x30, 0x84, 0x1, {0x5, 0x3, 0x8000, 0xe9, 0x8b, 0x7, 0x5, 0xffff, r14}}, @authinfo={0x18, 0x84, 0x6, {0x400}}, @authinfo={0x18}, @sndrcv={0x30, 0x84, 0x1, {0x70d1, 0x7, 0x8000, 0xfffffff7, 0x8, 0x1, 0x1000, 0x8001, r15}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x27}}, @authinfo={0x18}], 0xc8, 0x4}], 0x7, 0x10008) [ 218.411176] chnl_net:caif_netlink_parms(): no params data found [ 218.487449] IPVS: ftp: loaded support on port[0] = 21 [ 218.493806] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.501819] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.510387] device bridge_slave_0 entered promiscuous mode [ 218.527647] bridge0: port 2(bridge_slave_1) entered blocking state 10:01:22 executing program 2: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e24, @remote}, {0x2, 0x4e22, @local}, 0xc, 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000080)='lo\x00', 0x4, 0x1, 0x7f}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000180)={0x400a, 0x9, 0x7f, 0x7}) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000200)={0x80, 0x3, 0x80, 0x0, 0xffffffff, 0x6, 0x3f, 0x2, 0x9, 0x5, 0x40, 0x2, 0x0, 0x200, 0x7fff, 0xff, 0x7f, 0x2, 0x4}) r4 = dup(0xffffffffffffffff) ioctl$SIOCX25GFACILITIES(r4, 0x89e2, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000280)={'syzkaller1\x00', {0x2, 0x4e21, @loopback}}) write$FUSE_GETXATTR(r0, &(0x7f00000002c0)={0x18, 0x0, 0x5, {0x8}}, 0x18) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000300)={{0xa, 0x4e24, 0x8, @mcast1, 0xbe}, {0xa, 0x4e20, 0x3, @mcast1, 0x5}, 0x0, [0x8000, 0x7, 0xffffffff, 0x2, 0x32ec, 0xb8b, 0x5d83, 0xef]}, 0x5c) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000380)={0x0, 0x40000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r5, 0xc04064a0, &(0x7f00000004c0)={&(0x7f00000003c0), &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2, 0xa, 0x6}) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000500)={0x0, 0x3}) r6 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r7 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000540), 0x80000) kcmp(r1, 0xffffffffffffffff, 0x6, r6, r7) r8 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000580)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_CROP(r8, 0x4014563c, &(0x7f00000005c0)={0xa, {0x1, 0x9, 0x7f, 0xfffffff7}}) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000600)) sendmsg$nl_crypto(r4, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@delrng={0x10, 0x14, 0x300, 0x70bd2c, 0x25dfdbfd, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x1}, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r9, &(0x7f0000000740), &(0x7f00000007c0)=0x6e) capget(&(0x7f0000000800)={0x20071026, 0xffffffffffffffff}, &(0x7f0000000840)={0x5, 0x5c7, 0x401, 0x2, 0xffffffc0, 0x4}) r10 = accept$netrom(0xffffffffffffffff, &(0x7f0000000880)={{0x3, @default}, [@default, @default, @remote, @rose, @default, @bcast, @netrom, @default]}, &(0x7f0000000900)=0x48) recvmmsg(r10, &(0x7f00000020c0)=[{{&(0x7f0000000940)=@nfc_llcp, 0x80, &(0x7f0000001c80)=[{&(0x7f00000009c0)=""/84, 0x54}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/231, 0xe7}, {&(0x7f0000001b40)=""/217, 0xd9}, {&(0x7f0000001c40)=""/17, 0x11}], 0x5}, 0x81}, {{&(0x7f0000001d00)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000002040)=[{&(0x7f0000001d80)=""/132, 0x84}, {&(0x7f0000001e40)=""/103, 0x67}, {&(0x7f0000001ec0)=""/51, 0x33}, {&(0x7f0000001f00)=""/179, 0xb3}, {&(0x7f0000001fc0)=""/93, 0x5d}], 0x5}, 0x7}], 0x2, 0x4, &(0x7f0000002140)={0x0, 0x989680}) accept$alg(r0, 0x0, 0x0) r11 = openat$zero(0xffffffffffffff9c, &(0x7f0000002180)='/dev/zero\x00', 0x4002, 0x0) ioctl$TIOCSPTLCK(r11, 0x40045431, &(0x7f00000021c0)=0x1) [ 218.534033] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.542475] device bridge_slave_1 entered promiscuous mode [ 218.589783] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.607848] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.688647] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.697567] team0: Port device team_slave_0 added [ 218.708242] chnl_net:caif_netlink_parms(): no params data found [ 218.737934] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.745800] team0: Port device team_slave_1 added [ 218.773659] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 10:01:22 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)=""/52, &(0x7f0000000040)=0x34) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000080)=@ipx, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)=""/231, 0xe7}], 0x1, &(0x7f0000000240)=""/180, 0xb4}, 0x40000000) openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x200000, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) r2 = eventfd(0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000003c0)=@v1={0x0, @aes128, 0x3, "ff8b54227bafdfe6"}) restart_syscall() r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/checkreqprot\x00', 0x400000, 0x0) ioctl$RTC_PIE_OFF(r3, 0x7006) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20011800}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x44, r4, 0x800, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x23}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x80) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/capi/capi20\x00', 0x4100c1, 0x0) write$P9_RREAD(r5, &(0x7f0000000600)={0x52, 0x75, 0x2, {0x47, "3f47f81ffbe93a6f7cc675aee2eaf7ca7d97910e0e255e21eedf765a5f7f6f4679d59d53fdf40648e9f5f2332d33e44978f4cb9235c30b03c169b3cb838fa1554d4b4f6c321fcd"}}, 0x52) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/status\x00', 0x0, 0x0) ioctl$TCGETS2(r6, 0x802c542a, &(0x7f00000006c0)) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000940)={0x4c, 0x0, &(0x7f00000007c0)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000700)={@fda={0x66646185, 0xa, 0x1, 0x2f}, @fda={0x66646185, 0x4, 0x1, 0x7}, @flat=@binder={0x73622a85, 0x10a}}, &(0x7f0000000780)={0x0, 0x20, 0x40}}, 0x1000}], 0xef, 0x0, &(0x7f0000000840)="bc4bff9dfc5c3be2a41b4c9b64c30c00fd19ec1c4da92bfdae40dc00ca5f376a7ba8d141e6255808bbc18fb60409998c85622d19224ae61bff22199f73c36c1273b877a5e6e5926ba6ee5cd1dc43ea949c62be2341be1832f3e9f5f12466bba2963d20daa735753c9084ba1578ee299a5fcfcba63e1f977c7eedf621e7b3950f49d76dc586a882ad006a03adff35da59228c9ae8f89d30bc283be130d130a9f7e95027b1b700f699812eedf8eba3b06a174691eb9a4bd3dd0fdb1b8abc929311d43db91e79d91e30261a7d9deb350c5665cbe812f1cc70b62bee38441cc2828bb470916ae8befeba262cc7dd6a34ff"}) seccomp(0x1, 0x0, &(0x7f00000009c0)={0x7, &(0x7f0000000980)=[{0x0, 0x56, 0x7, 0x8001}, {0xf000, 0x0, 0x9, 0x80}, {0x2, 0x1, 0x1, 0x10000}, {0x800, 0xda, 0x5, 0x7}, {0x1, 0x80, 0x4}, {0x81, 0xbb, 0x9, 0x5}, {0x2, 0x3, 0x3b, 0x6}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000a00)=']\x00') r7 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/video1\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(r7, &(0x7f0000000a80)='trusted.overlay.origin\x00', &(0x7f0000000ac0)='y\x00', 0x2, 0x3) r8 = syz_open_dev$midi(&(0x7f0000000b00)='/dev/midi#\x00', 0xfffffffffffffffc, 0x20000) ioctl$VHOST_RESET_OWNER(r8, 0xaf02, 0x0) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/hwrng\x00', 0xc0200, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r9, 0x40045730, &(0x7f0000000b80)) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/dlm-monitor\x00', 0x40000, 0x0) setsockopt$bt_hci_HCI_FILTER(r10, 0x0, 0x2, &(0x7f0000000c00)={0x5, 0x11df71e6, 0x3, 0x4}, 0x10) r11 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000c40)={0x2, 0x70, 0x3, 0x1f, 0x74, 0x6, 0x0, 0x2, 0x1000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x1, 0xffffffff00000001}, 0x5000, 0x1, 0x800, 0x4, 0xffff, 0x2, 0x8}, r11, 0x4, r6, 0x8) [ 218.806609] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.815892] IPVS: ftp: loaded support on port[0] = 21 [ 218.875750] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.882340] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.892512] device bridge_slave_0 entered promiscuous mode 10:01:22 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000000)={0x0, 0x100000, 0x78f91e20cd637a80, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1}, 0x10) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xff, 0x10202) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xdcb) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x1d, 0x500) prctl$PR_GET_NAME(0x10, &(0x7f0000000140)=""/49) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000180)=0x6) r3 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xb7ea, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000200)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x44) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) getpgrp(r5) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000380), &(0x7f00000003c0)=0x4) r7 = accept4(0xffffffffffffffff, &(0x7f0000000400)=@tipc=@id, &(0x7f0000000480)=0x80, 0x800) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f00000004c0)={@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x1, 0x9, [@initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x15}, @loopback, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2]}, 0x34) r8 = accept4(0xffffffffffffffff, &(0x7f0000000500)=@l2, &(0x7f0000000580)=0x80, 0x80800) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x80000, 0x0) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000019c0)={0xffffffffffffffff, 0x5, 0x8}, 0xc) r11 = syz_open_dev$usbmon(&(0x7f0000001a00)='/dev/usbmon#\x00', 0x5, 0x111000) getresuid(&(0x7f0000001a40), &(0x7f0000001a80)=0x0, &(0x7f0000001ac0)) sendmsg$netlink(r8, &(0x7f0000003080)={0x0, 0x0, &(0x7f0000003040)=[{&(0x7f0000000600)={0x13b4, 0x2b, 0x200, 0x70bd2b, 0x25dfdbfc, "", [@nested={0x10, 0x6, [@generic="eafe8def00e3caee027bc4"]}, @generic="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", @typed={0x70, 0x43, @binary="6dffa520ebacdb6f6db14c7c49c34538aa0838170f62ad03ac632befa2181c2817d24369a9b74f42dbf2c2f8b498e385e0d240ce6aec3dfa19b008008cfa20d01ec930ea59fd2a8e87342add92cf7aedcdc1988fc5ebfa3d9da7096b593216f09d1783576a5c24b1bab5"}, @nested={0x1188, 0x78, [@generic="4d4f33c6d9c473d2e3b97bd3d3dc8f56c906d725ce52f8f583b388a605fa245acfb7ee1289176f7442ce3f584352d832f4e8152a68bb6a9fb78bf1060f88b0d8942bef6a91cf97a3805272dd3bbe6708e19030f620b4210438c1f5fee74508ef26ec142ff2ef99160408525e5a5822aa8bf32da47eccedcecb131b7f554cc05d98f4ac7f7a509175b00f3eb9c56d1a496728d889d1bac6103d312525e22be4ea1d81a500920ff0afa45f7fae2b46fd679d2cae961bb37e8ea1d5f3e52b7753f74428d5bc528c0c7fda95066cca185790e87eac0503af95f08dddeabe2044f47049f9f7dfd8b643d629316f59c2", @typed={0x8, 0x6, @fd=r9}, @generic="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", @generic="865443a2b5618af7a25ee6b25e04fb76e1fcf880afd605b9f355bc5b40da8c137fdd6fddfde81c9ef5fc7057de2f5c0e8e51b937f144628e824d6fa9d6e1c9635bf614e98a0b68e827078ca5ab804997cc0f1cf2b37f5a53769365b60f39e36d9498e1b10a1e046bb1dd933b936e12bd2d8a09376a12f5fef32fdd29402065ae3a56590f16afea0a7ace35bfd8d2"]}, @nested={0xa0, 0x81, [@typed={0x8, 0x5c, @ipv4=@broadcast}, @generic="b11d2dab8ed721f8e15b114a4e66f02df557f9c68e84dd5a4022975e6c1bd4a287ab0be0cec1803eea6fde262b3dc6573f01e56bc92217815e3f70bd669dd944f3ff311601351ce66ea9cab646781131a3a212f26696c03e9e7e1668657bee58c237e5fd892f33b3766bc99cccaafe37f3067bb2bf09c86d3a689701eec3ff59789fa4765ad338ebfbf13e863db0ef44a7ca"]}]}, 0x13b4}, {&(0x7f0000001b00)={0x1530, 0x1a, 0x7, 0x70bd2c, 0x25dfdbff, "", [@nested={0xc8, 0x1d, [@generic="e98ccb78c8822f9319bf94accf56f0d81a3f391e57064c6583c8d09c56234f31f84dc3f4023d71663fcc9d7abe91a056236af3da605bad55f52fa59a2d56f665c841773f0147a366581f77abb11653bc1456bcb10a451c13a159e5cb3618b355548aa549b8879092eefdc9cec4a96e8cf080a2754ec1b0d9cb805868b541b7854c849edba71783656b2293847a6752688b9b60c54baf4fae", @generic="60db97d6a11d752bac6239bda6d2c4542ddbeee1b35965aa48f21b7899ef650f1db3399ade9775fb8531"]}, @typed={0x8, 0x31, @fd=r10}, @generic="e0d5661922738ea566acfaf89e7487395d6869e8c4ac4e5a3d2d88ad113f8cb413cb52ba75", @typed={0x4, 0x61}, @nested={0xb4, 0x44, [@typed={0x8, 0x54, @ipv4=@local}, @typed={0x8, 0x29, @fd=r11}, @typed={0x8, 0x5d, @uid=r12}, @generic="51b0226fdc3b48092a95af1dc8315050e92bc3c873a61cd8c4f7c0350be3337dcbc6af66c1e6ebfd1378b8ce233cc2b05874e661f1e5ca3b2efb7efae5c21031eb1a274a41161689503e1252894b4ae6acab14b1a07da3fbabf0ee607430e1400d8a197d0d5f2d7dcf34fc9d6e1f9ec944d07330e1d0d9f04a7be7d6501c3c", @typed={0x14, 0x20, @ipv6=@ipv4={[], [], @multicast2}}, @generic="609d"]}, @nested={0x35c, 0x6c, [@generic="7e537d8287ef7dfd29e3e0f628a4bbedd4d3328490574c923133035fd14954214d34eabb635b3670f350375a97f737b07f468352e3b4cb45b4cd52279fe7d3aa8a4ca0c69747f09ecdb8c6607c358e2b9b425fe379a7507f5f2bdeecba978c58035466d6", @generic="3bf2d80528f72219b61697f719335202f5fbdcb6f9ec9ff5e270896e4131102df76eec751a1b10660431f672cd0321cc00b38977d20a592547a7b68ab8d094b7e71570d65b527560ae048771ec61cab19a358e340155650e9ea10698b7f130c442d689c6e209a2b6c8ba878ac512aa10fb5cf64b94dd6a2a5fa0403e92922409ad503159ffbc9f5b9da1dbb38dd06f3489d32bc5f6cba3ed419dc162162820a45ae54371e62965fa5fd9aa00dfbb4495", @typed={0x14, 0x2, @ipv6=@rand_addr="08f13cf74051b7996c27ec9649ba1b00"}, @generic="ba41a086f3b3e92ab141d000f8e62a393e53f514a8c4c8a811a36e13553dad9c99c5573be7b593f69583060c32d3e57d070d3c1e786faa58abbecafe0dc11e61ced7152827bca66efae33dfbf5346005edb8597f67398c3e538ff3e9a7c5ad4cb227017400c0ac06a6549a30339c8948290b325979c30009", @generic="afb0f95229cff895cadd1fff2b2d5538945b3e06f9a45f23e31f1d975eee8b325b7f64d6e11a9a818717", @typed={0x8, 0x4e, @u32=0x5}, @generic="b524f4840ad4e97e2dd7faa1616bcf8cf5dad812864b12236ad84854ef37284a6c76c7c89d485691345f479d95dca0e735195dc9a4c2cc92b20e595329f6dd974f8f5581d8ca2c42bb388dea8864c37c02a6ea1f8198ba36a5f10ba9b549c87cb9a1f6af1a434a48e5856dea2847fc8e26f502d23bd68079bb7fdfa2a268c9c80796647f6616b10b6d0e67cd90f88c957a2e5a433211b20632ad1f5f6d26b47e3521b0c17a15d23fdff8663ae3168bf3568b3097637b0479877daa8eec4749063813d8831be97307f7edf1051b035e7794d45261354402d4208dedf6d615c3246f6be65e3401d65a59108215ff07e85dcc636cac5c44cd90", @typed={0x8, 0x7b, @pid}, @generic="7142795d88484fa39ab186b8ab6c1f44bfda7f4c5a4f65f3407957a589acbcd94725bf3e57f2903ec0015da68b0a74d21d733d02fd6650632aac47c36dc501b818268f7984b2c9361b29e2b45f2f29fc864278d7e8882a3f760ad2161fa855c4802d7095f8ea530b2a92e2c29b09ff86bb2f0eea684a02f1fc6de13a9822fd549236a08937"]}, @generic="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", @typed={0x14, 0x76, @ipv6=@mcast2}]}, 0x1530}], 0x2, 0x0, 0x0, 0x4000000}, 0x688e85f05dd0d4fd) connect$caif(r1, &(0x7f00000030c0)=@rfm={0x25, 0x8, "e729ef634a9741974185aac057ddc17b"}, 0x18) r13 = dup(0xffffffffffffffff) getsockopt$inet_mreq(r13, 0x0, 0x62, &(0x7f0000003100)={@broadcast, @multicast2}, &(0x7f0000003140)=0x8) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f00000031c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r8, &(0x7f00000032c0)={&(0x7f0000003180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000003280)={&(0x7f0000003200)={0x78, r14, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x69}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xbec}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0x8000) [ 218.957085] device hsr_slave_0 entered promiscuous mode [ 218.994587] device hsr_slave_1 entered promiscuous mode [ 219.034794] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 219.041958] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 219.066745] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.073158] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.091087] device bridge_slave_1 entered promiscuous mode [ 219.112723] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.129872] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.143538] IPVS: ftp: loaded support on port[0] = 21 [ 219.143777] IPVS: ftp: loaded support on port[0] = 21 [ 219.181437] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.188221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.195330] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.201830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.258927] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.267458] team0: Port device team_slave_0 added [ 219.298640] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready 10:01:22 executing program 5: r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x101) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80000, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000100)=0x1) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x200000, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f00000001c0)=0x49) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x8800, 0x0) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f0000000240)={0x401, 0x2a85, 0x1000, 0x6, 0x6}) clock_gettime(0x1, &(0x7f0000000280)) r4 = openat(r1, &(0x7f00000002c0)='./file0\x00', 0xa0100, 0x20) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x88466b6bd8c5b952}) pipe(&(0x7f0000000340)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0xa159, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}}, 0x4, 0x6, 0xff, 0x4, 0x89136367d2e9a320}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000480)={r6, 0x2}, &(0x7f00000004c0)=0x8) clock_gettime(0x5, &(0x7f0000000500)) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x40, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', r7, &(0x7f00000005c0)='./file0\x00', 0x0) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm-monitor\x00', 0x80280, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r8, 0xc008551b, &(0x7f0000000640)={0x7, 0x8, [0x5, 0x40]}) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f0000000680)={0x1, [0x0]}, &(0x7f00000006c0)=0x8) timer_create(0x6, &(0x7f0000000700)={0x0, 0x1f, 0x4}, &(0x7f0000000740)=0x0) timer_delete(r10) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vcs\x00', 0x20, 0x0) ioctl$SIOCX25SCALLUSERDATA(r11, 0x89e5, &(0x7f0000000980)={0x26, "2341323e64052c84256713376f1d9d00829335bfe455f624c50ac211f920452ec9c189b68815d3abd961dfec31e3bdf5bdc8014b72a37c320c2b25df5108977e2657c917d2a4ad27f6f26b080a3c9a05935afef7014163ca5aee1dc4fde95534055b3ebced39a99a586aae7ae56338d731fc3ad90f3e49dfaaecd0c8f5569f91"}) r12 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/dsp\x00', 0x400000, 0x0) accept4$unix(r12, &(0x7f0000000a80), &(0x7f0000000b00)=0x6e, 0x800) ioctl$DRM_IOCTL_IRQ_BUSID(r7, 0xc0106403, &(0x7f0000000b40)={0x4, 0x3f, 0x100, 0x1}) [ 219.307387] team0: Port device team_slave_1 added [ 219.318361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.377248] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.403214] chnl_net:caif_netlink_parms(): no params data found [ 219.430158] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.448148] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.516147] device hsr_slave_0 entered promiscuous mode [ 219.554582] device hsr_slave_1 entered promiscuous mode [ 219.635190] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 219.643406] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 219.680252] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.682478] IPVS: ftp: loaded support on port[0] = 21 [ 219.693617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.703337] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 219.738509] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.745660] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.752740] device bridge_slave_0 entered promiscuous mode [ 219.760351] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.766808] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.773743] device bridge_slave_1 entered promiscuous mode [ 219.803861] chnl_net:caif_netlink_parms(): no params data found [ 219.846589] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 219.854044] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.900845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.908777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.918534] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 219.924833] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.931993] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.965312] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.978482] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.984973] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.992089] device bridge_slave_0 entered promiscuous mode [ 219.999436] chnl_net:caif_netlink_parms(): no params data found [ 220.021705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.029791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.037633] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.044359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.056512] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.062884] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.071062] device bridge_slave_1 entered promiscuous mode [ 220.097286] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.107604] team0: Port device team_slave_0 added [ 220.117787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.132932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 220.142690] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.150721] team0: Port device team_slave_1 added [ 220.156295] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.164421] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.172446] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.181465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.189587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.198222] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.204619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.211431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.237817] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.245030] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.252229] device bridge_slave_0 entered promiscuous mode [ 220.259301] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.265847] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.272868] device bridge_slave_1 entered promiscuous mode [ 220.290465] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.303368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.321467] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 220.366256] device hsr_slave_0 entered promiscuous mode [ 220.404755] device hsr_slave_1 entered promiscuous mode [ 220.453693] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.460998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.471208] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.487717] chnl_net:caif_netlink_parms(): no params data found [ 220.498709] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 220.505927] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.513623] team0: Port device team_slave_0 added [ 220.519160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.527764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.536531] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.545936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.554124] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.566009] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 220.574131] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.581845] team0: Port device team_slave_1 added [ 220.591081] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 220.597559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.605524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.613104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.620328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.629047] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.648823] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.660459] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 220.667882] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.680813] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 220.700469] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.709186] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.717019] team0: Port device team_slave_0 added [ 220.723078] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.730782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.740085] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.760351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.768127] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.776457] team0: Port device team_slave_1 added [ 220.782069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.790275] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.798061] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.804458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.811504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.819479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.827060] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.833436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.841254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 220.863978] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.873656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.882094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.889955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.899147] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.946065] device hsr_slave_0 entered promiscuous mode [ 220.984510] device hsr_slave_1 entered promiscuous mode [ 221.045027] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.051794] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.058518] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.066073] device bridge_slave_0 entered promiscuous mode [ 221.073019] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.086384] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.136142] device hsr_slave_0 entered promiscuous mode [ 221.174602] device hsr_slave_1 entered promiscuous mode [ 221.215232] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 221.221326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.229160] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.236159] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.242522] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.250204] device bridge_slave_1 entered promiscuous mode [ 221.257518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.272936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.280802] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.288469] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.309327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.325769] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.340489] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 221.348647] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.357387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.365802] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.373668] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.387147] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.398597] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.407070] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.428105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.440357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.448644] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.458569] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 221.472775] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.482007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.489883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.499988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 221.509347] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.516745] team0: Port device team_slave_0 added [ 221.526301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.533782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.545789] audit: type=1400 audit(1570356084.979:38): avc: denied { associate } for pid=7551 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 221.575149] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.582313] team0: Port device team_slave_1 added [ 221.590108] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.600599] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 221.610078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.633250] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.662497] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.702307] audit: type=1400 audit(1570356085.129:39): avc: denied { create } for pid=7573 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:01:25 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) [ 221.733398] audit: type=1400 audit(1570356085.129:40): avc: denied { write } for pid=7573 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 221.767193] device hsr_slave_0 entered promiscuous mode [ 221.772751] audit: type=1400 audit(1570356085.129:41): avc: denied { read } for pid=7573 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:01:25 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) write$FUSE_BMAP(r0, 0x0, 0x0) [ 221.815317] device hsr_slave_1 entered promiscuous mode [ 221.844947] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.856693] 8021q: adding VLAN 0 to HW filter on device bond0 10:01:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000180), 0x4) [ 221.869416] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.876246] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 221.884711] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.909216] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 10:01:25 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000180), 0x4) [ 221.918767] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.936733] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.951632] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 221.959326] 8021q: adding VLAN 0 to HW filter on device team0 10:01:25 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r1, r2) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000200)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r3) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x18, &(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYBLOB="00000000c25fbf6fb061dc4ee17cf2813a6e24e73543a88690cbc43400bb6e95a6c6db60f5b76826ff738dde415d42d3ef7b501008f5391e607a275bc4e28fea702df870990f96534d3d7e5b52f06b3abffc40254636ac312ee784271372a3cad99a8998d90e4173619bbdb1392ad7a0978fca4f4f05e915ec0ac46ac5122669b929885b679943e7"], 0x8) [ 221.976608] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.997455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.011304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.020865] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.037854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.051196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.059568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.066703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.074601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.082222] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.082728] hrtimer: interrupt took 35084 ns [ 222.088615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.108999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.118278] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.126426] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.134569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.144124] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.159096] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.166256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.174523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.182184] bridge0: port 2(bridge_slave_1) entered blocking state 10:01:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x1a011, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000340)=ANY=[@ANYBLOB='4'], 0x1) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001600)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x1a011, r3, 0x0) [ 222.188589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.196008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.217235] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.228154] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.268779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.278222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.295234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.302897] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.309298] bridge0: port 1(bridge_slave_0) entered forwarding state 10:01:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$uid(0x0, 0x0, 0x0) [ 222.318537] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.327559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.344767] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.353565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.360208] audit: type=1400 audit(1570356085.789:42): avc: denied { map } for pid=7597 comm="syz-executor.0" path=2F6D656D66643A73797374656D2E736F636B70726F746F6E616D65202864656C6574656429 dev="tmpfs" ino=26431 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 222.391950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.401330] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.414499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.424113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.436813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 10:01:25 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@mcast1, @ipv4={[], [], @loopback}, @mcast1, 0x7fffffff}) [ 222.460691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.475320] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.481686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.501552] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.510148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.521806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.530522] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.542173] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.548342] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.557164] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.572151] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 222.580958] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.594411] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.602961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.618135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.626108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.633687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.646677] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 222.660813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.669193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.679638] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.689293] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 222.697951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.705795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.713719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.722037] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.728573] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.739223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.747485] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.756139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.765391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.773255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.783823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.791724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.799955] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.806422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.813467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.821508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.829268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.841068] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.850092] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.856428] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.863395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.870606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.878746] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.891612] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.899364] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.908664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.917904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.930649] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 222.938994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 222.947584] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.953654] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.970122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.976809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.986060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.995817] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.004182] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 223.016199] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.022492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.032066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.040299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.049888] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 223.058381] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.071375] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.078161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.086719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.094326] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.100679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.107562] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.115658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.123460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.130817] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.140659] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.150451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.160476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.169085] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 223.179994] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.187828] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.196213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.203617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.211093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.218851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.226409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.234109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.241783] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.248163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.263969] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.272655] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.293032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.309072] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.319923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.335046] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.356098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.370430] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.392101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.411226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.427781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.437969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.451878] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.452168] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure [ 223.469325] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.477428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.485736] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.495818] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.505650] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 10:01:26 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000040)="c9", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x16, r0, r1, 0x0, 0x0) [ 223.523651] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 223.545839] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 223.573827] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.583712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.598394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.607070] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.619329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.627123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.658508] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.671063] 8021q: adding VLAN 0 to HW filter on device batadv0 10:01:27 executing program 3: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b465abb4c921955fb6086244113182b8f313593c4f226eb613cd116ca4a388a9782d215e5884f52b2d77743051d52101ea9e6b5f4732a3001bd238965172bacf7a82f5b4ed470000e28d20a1b63316035911bcc91665ae6e37b5246b01389448912f207cafed83929be5e931", 0xa9, 0xfffffffffffffffd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f00000000c0), 0x202, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r4, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 10:01:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000100", @ANYRES32=0x0], &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={r2}, 0xc) [ 223.733512] audit: type=1400 audit(1570356087.159:43): avc: denied { write } for pid=7632 comm="syz-executor.5" name="net" dev="proc" ino=27702 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 10:01:27 executing program 5: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000001000ff00fd4354c007110000f30501000a000100020423dcffdf00", 0x1f) 10:01:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmodat(0xffffffffffffffff, 0x0, 0x0) 10:01:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x15, r0, 0x0, 0x0) 10:01:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x200, 0x0) r2 = shmget(0x1, 0x1000, 0x1, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) [ 223.803808] audit: type=1400 audit(1570356087.159:44): avc: denied { add_name } for pid=7632 comm="syz-executor.5" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 10:01:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@nodots='nodots'}, {@fat=@gid={'gid'}}], [{@fsuuid={'fsuuid'}}]}) 10:01:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) pipe2(0x0, 0x800) lsetxattr$trusted_overlay_opaque(0x0, &(0x7f00000000c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) 10:01:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setpriority(0x2, 0x0, 0x0) 10:01:27 executing program 2: r0 = epoll_create1(0x0) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) [ 223.930952] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 223.946055] audit: type=1400 audit(1570356087.159:45): avc: denied { create } for pid=7632 comm="syz-executor.5" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 10:01:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)) [ 224.003747] FAT-fs (loop3): Unrecognized mount option "fsuuid=" or missing value 10:01:27 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x17, r0, 0x0, 0x0) 10:01:27 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x100000000000000) 10:01:27 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', 0x0, r1) chown(&(0x7f0000000000)='./file0\x00', 0x0, r1) 10:01:27 executing program 1: syz_mount_image$jfs(&(0x7f0000001c40)='jfs\x00', &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@errors_continue='errors=continue'}, {@iocharset={'iocharset', 0x3d, 'macromanian'}}]}) 10:01:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, &(0x7f0000000100)) [ 224.152724] audit: type=1400 audit(1570356087.359:46): avc: denied { create } for pid=7651 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 10:01:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x40000107}]}) 10:01:27 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) 10:01:27 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000040)="c9", 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, 0x0, r0}, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r1, r2}, &(0x7f00000000c0)=""/69, 0x45, 0x0) [ 224.303105] audit: type=1400 audit(1570356087.359:47): avc: denied { write } for pid=7651 comm="syz-executor.5" path="socket:[27747]" dev="sockfs" ino=27747 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 10:01:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000ac0)={r0, 0x0, 0xe, 0x0, &(0x7f00000005c0)="3104e4a5a2886aa1a30600008e00", 0x0, 0x103}, 0x28) [ 224.374025] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 10:01:27 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) socket$xdp(0x2c, 0x3, 0x0) 10:01:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) 10:01:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/103) [ 224.485258] audit: type=1400 audit(1570356087.919:48): avc: denied { prog_load } for pid=7710 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 10:01:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x40}, &(0x7f0000000180)=0x18) [ 224.674059] audit: type=1400 audit(1570356088.099:49): avc: denied { prog_run } for pid=7710 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 10:01:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 10:01:28 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 10:01:28 executing program 0: syz_open_dev$mice(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 10:01:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='veth1_to_team\x00'}, 0x10) 10:01:28 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x22, 0x0, &(0x7f0000000100)) 10:01:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='\x00') 10:01:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x3}, 0x8, 0x0) 10:01:28 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000240)={{0x3, @default}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 10:01:28 executing program 1: socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 10:01:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) [ 225.131241] mmap: syz-executor.3 (7739) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 10:01:28 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x0) 10:01:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x4) [ 225.312994] ax25_connect(): syz-executor.2 uses autobind, please contact jreuter@yaina.de 10:01:28 executing program 0: syz_mount_image$jfs(&(0x7f0000001c40)='jfs\x00', &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:29 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 10:01:29 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r2, 0x2, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x0, r1, 0x0}]) 10:01:29 executing program 5: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) 10:01:29 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x18, 0x0, 0x0) 10:01:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x0, 0x0) 10:01:29 executing program 2: syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:29 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)='h[', 0x2) 10:01:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) 10:01:29 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 10:01:29 executing program 0: r0 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000000c0)=@req3, 0x1c) 10:01:29 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x16, 0x0, 0x0) 10:01:29 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x3) write$binfmt_script(r0, 0x0, 0x0) 10:01:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000300)='sy\x94tem.so\x06\x00\x00\x00\x00\x00\x00\x00a\x01\xfc\xff[\x15\xba\xe9\x03\x00\x00\x00\x00\x00\x00\x0085[!\xb6^$\xc6\xcc\xe3\xa7U3.v\xf7\xcf\xb7h>\xdf\x95\x1cx\xa1\xda\xeeD!\xc0`5\r{\xa0\xc4\xa1\xcf,{$\xbe\xb9\x1c\xc1\x9a`W\x0eXa\xca \xb4\x81\xec0kJo\xed\x11.\xf2\x9d`v\xc5\x83\xe7mwq\x84\x1e\xc2\x8d\xecS\xab\xdb\x83\xbdE[\xc5\xe1\r\xe2\xb3\xf0L\xe6\\ \x86\xc5II\x8c\xe9\xed\xf1\xc0\xb56\xba\xca/\xe3\xdfK\xcd\v$\xfbs\x8c\xd0\xe9\xd1\x10\f\x1b\x9d\xdc\t\'\xf4\xeb:\xbeAK\b\x01\':\xb4\xe2\x11\xd7\xca\x0e\x04d\'\x8f\xbc\xd2\x96\x10!\xe1#\xba(\xae\x1d_\xa0f\xa3\xb5\x99\x9bZ\xfc0\xba\xdb\xa5f\xc6\x17Y\xd3\xfa\x06\x95v+\x00\x00\xda\xf6\xf8\xd6CT\xa4\xa7W%\xe8hB:2\x11+>s\xa4+\xa7\xe8\x1f\x12\xae\x8c\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 10:01:29 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x30, 0x0, 0x280) 10:01:29 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0xe2460aa766da4e1f) 10:01:29 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x84047, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 10:01:30 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) getsockopt$sock_buf(r2, 0x1, 0x3d, 0x0, &(0x7f00000002c0)) 10:01:30 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x3}) 10:01:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r2, 0x0) [ 226.542817] audit: type=1400 audit(1570356089.969:50): avc: denied { map } for pid=7855 comm="syz-executor.3" path=2F6D656D66643A73799474656D2E736F06202864656C6574656429 dev="hugetlbfs" ino=28136 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 10:01:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000003040)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000001780)="887b2f4a8b3bc678c9a9f6df332c93b2", 0x10}], 0x1}}], 0x1, 0x0) 10:01:30 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/173}, {&(0x7f0000000040)=""/54}, {&(0x7f0000000540)=""/190}, {&(0x7f0000000600)=""/152}, {&(0x7f0000000100)=""/109}], 0x0, &(0x7f0000000740)=""/4096}}], 0x2db, 0x2, 0x0) syz_open_dev$admmidi(&(0x7f0000001980)='/dev/admmidi#\x00', 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) [ 226.693592] audit: type=1800 audit(1570356090.039:51): pid=7863 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16550 res=0 10:01:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:30 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x1, 0x6}, {0x0, 0x0, 0x1800}, {0x1, 0xfffffffffffffff8}], 0x3) semop(r0, &(0x7f0000000240), 0x2) 10:01:30 executing program 1: getpid() openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240)=ANY=[], 0x0) 10:01:30 executing program 0: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$int_out(r0, 0x40049409, 0x0) [ 226.758680] audit: type=1800 audit(1570356090.069:52): pid=7863 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16550 res=0 10:01:30 executing program 3: fanotify_init(0x50, 0x0) 10:01:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) 10:01:30 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000140)='\x00\x00\x00\xb6\xa27\xde\a7id\x97\xdb\xb8\x01\'\xf5\x9d\vfCz\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000180)='\xf1keyringvboxnet1#posix_acl_accessGPLwlan0posix_acl_accessmd5sum\x00') 10:01:30 executing program 4: syz_emit_ethernet(0x46, &(0x7f00000002c0)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "629c81", 0x10, 0x2b, 0x0, @dev, @rand_addr="6fc3a9df47cffea2660190d179965cc3", {[], @dccp={{0x4e23, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "2ca5b3", 0x0, "818a12"}}}}}}}, 0x0) 10:01:30 executing program 5: syz_mount_image$minix(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2134000, 0x0) 10:01:30 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) 10:01:30 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x4102, 0x0) 10:01:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) 10:01:30 executing program 4: futex(&(0x7f00000002c0)=0x2, 0x8b, 0x2, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000340), 0x0) 10:01:30 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x2d}]}) 10:01:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x3}, 0x8, 0x0) 10:01:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x15, 0xd, 0xffffffffffffffff) [ 227.193797] syz-executor.1 (7899) used greatest stack depth: 22416 bytes left 10:01:30 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFBR(r0, 0x8983, &(0x7f0000000080)=@add_del={0x2, 0x0}) 10:01:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x\x11k4\xd3\x1b\x05\xaf\xf0\x1eyRN\xc9\xc6V\x00\x02\x00\x00\x00\x00\x00\x00\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 10:01:30 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000180)=""/58, 0x3a}], 0x2, 0xff0f0c00) 10:01:30 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='overlay\x00', 0x0, &(0x7f0000000400)={[{@default_permissions='default_permissions'}]}) 10:01:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000100", @ANYRES32=0x0], &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x17, &(0x7f0000000000)={r2}, 0xc) 10:01:30 executing program 2: mlockall(0xf) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) shmctl$IPC_RMID(r0, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x1000004001) [ 227.388166] overlayfs: missing 'lowerdir' 10:01:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000400)) 10:01:30 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x2) 10:01:30 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x9c0000, 0x0, 0x0, [], 0x0}) 10:01:30 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet(0x2, 0x80001, 0x84) 10:01:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000180)=@buf) 10:01:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x9, 0x0, &(0x7f0000000100)) 10:01:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000001600)=@assoc_value, &(0x7f0000001640)=0x8) 10:01:31 executing program 4: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 10:01:31 executing program 5: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) 10:01:31 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) r1 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, 0x0, 0x0) connect$rose(r1, &(0x7f00000001c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 10:01:31 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, '%eth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) [ 227.715878] sctp: [Deprecated]: syz-executor.0 (pid 7982) Use of struct sctp_assoc_value in delayed_ack socket option. [ 227.715878] Use struct sctp_sack_info instead 10:01:31 executing program 4: get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x5) 10:01:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, 0x0, &(0x7f00000000c0)) 10:01:31 executing program 1: r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$int_out(r0, 0x8906, 0x0) 10:01:31 executing program 2: r0 = socket$isdn_base(0x22, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0x12, 0x0, &(0x7f0000000040)) 10:01:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setregid(0x0, 0x0) 10:01:31 executing program 0: futex(&(0x7f00000002c0), 0x7, 0x0, 0x0, 0x0, 0x0) 10:01:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x43, 0x0, 0x280) 10:01:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @mcast1, 0xd8d3}, 0x1c) 10:01:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080), 0x4) 10:01:31 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @remote, [], {@mpls_uc={0x8847, {[], @ipv6={0x0, 0x6, "5472f1", 0x8, 0x0, 0x0, @remote, @ipv4={[], [], @broadcast}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x0) 10:01:31 executing program 0: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r0, 0x0, 0x14, 0x0) 10:01:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x900000000000000, &(0x7f0000000100)={0x1, 0x1, 0x200000004, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x5f, 0x80ffff, 0x2e, 0x5f, 0x5f, 0x2e, 0x2e, 0x2e, 0x5f, 0x2e, 0x3f1]}, 0x3c) 10:01:31 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000040)) 10:01:31 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x18, 0x0, 0x0) 10:01:31 executing program 0: r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000100)="02", 0x1, r2) keyctl$unlink(0x9, r1, r2) 10:01:31 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x40000000) 10:01:31 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 10:01:31 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x8, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 10:01:31 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r2, 0x2, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x2, 0x0, r1, &(0x7f0000000240)}]) 10:01:31 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x18, 0x0, 0x0) 10:01:31 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}], 0x1c) 10:01:32 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0) socket(0x0, 0x0, 0x0) 10:01:32 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 10:01:32 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r0, 0x3, 0xb, 0x0) 10:01:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r2 = socket$netlink(0x10, 0x3, 0x0) dup3(r2, r1, 0x0) 10:01:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r3}, 0x10) 10:01:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$isdn_base(0x22, 0x3, 0x0) fstatfs(r1, 0x0) 10:01:32 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000700)="8c2fb074d782b99a4ebb28bd49ca9d8f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f680fcd8bd0da6e13b662424ccd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8f45aa7708f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce37375165fc7b892d92b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefd6c32891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404000000", 0xc9}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000006840)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/62, 0x3e}], 0x1}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/38, 0x26}, {&(0x7f0000000a80)=""/108, 0x6c}], 0x2}}], 0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 10:01:32 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000200)) 10:01:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_DUMPABLE(0x19) 10:01:32 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x2, r0, 0x0, 0x0) 10:01:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 10:01:32 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_int(r0, 0x0, 0x25, 0x0, 0x0) [ 229.264556] kauditd_printk_skb: 1 callbacks suppressed [ 229.264569] audit: type=1400 audit(1570356092.689:54): avc: denied { create } for pid=8108 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 10:01:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 10:01:32 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) socket(0x0, 0x0, 0x0) 10:01:32 executing program 0: keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x0}) 10:01:32 executing program 2: bpf$PROG_LOAD(0x15, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:32 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x18cae0, &(0x7f00000001c0)=@raw=[@alu], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 229.396746] audit: type=1400 audit(1570356092.729:55): avc: denied { getopt } for pid=8108 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 10:01:33 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 10:01:33 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet(0x2, 0x2, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0x18, 0x0, &(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES64=r0, @ANYRESDEC=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB]], 0x25, 0x0, &(0x7f0000000300)="c35a4fb0d2742cb4c171fa136c130f20e6cdbce2b55b48a04af7d95160696b7387e4a590a7"}) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x100000000, 0x0) pipe(&(0x7f00000000c0)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000280)={0x0, 0xcea3, 0x401, 0x100, 0x7, 0x20, 0x4, 0x72, 0x0, 0x0, 0x4, 0x1ff}) 10:01:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x12, 0x0, 0x300) 10:01:33 executing program 0: timer_create(0x2, 0x0, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}}, &(0x7f0000000200)) 10:01:33 executing program 5: syz_open_dev$dspn(0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x200100, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x0, 0x0) socketpair$unix(0x1, 0x100000002, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x12102) r4 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) connect$inet6(r4, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2}, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r5, &(0x7f0000000240)=0x202, 0x4000000000dc) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl$KVM_S390_UCAS_UNMAP(r5, 0x4018ae51, &(0x7f00000000c0)={0x8000, 0x7ff, 0x2}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="050cfd000000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x4000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd0028080}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x1c, r6, 0x0, 0x30bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24044885) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) r9 = dup(r2) r10 = open(&(0x7f0000000400)='./file0\x00', 0x200000, 0x1) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1032}, 0xc, &(0x7f0000000500)={&(0x7f0000000800)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="10002dbd7000ffdbdf25020000002400070008000100", @ANYRES32=r8, @ANYBLOB="080088052b0fcecc00240979ad61145f14392b8ac4e74387b6e12f9bc27a85ef460a9fe818c8a18bb8b71a79b4c51479447d64210d86fb415ddd8da0ff53ce9aca44f2a3ebe21c7584be891c117ffebf722e5d7c65196e0d125471b5cc7bbf00"/108, @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="0c000200000000000000000008000100000000000c00080006000000000000000c0004000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 10:01:33 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) socket(0x0, 0x0, 0x0) 10:01:33 executing program 2: rseq(&(0x7f0000000040), 0x20, 0x1, 0x0) 10:01:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x39, 0x0, 0x0) 10:01:33 executing program 0: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30501000a000100010423dcffdf00", 0x23c) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f30501000a000600020423dcffdf00", 0x1f) [ 230.179518] audit: type=1800 audit(1570356093.609:56): pid=8162 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16578 res=0 10:01:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000000)=""/136) [ 230.287283] binder: 8168:8168 unknown command 536872128 [ 230.325128] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 10:01:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r2}, 0xc) 10:01:33 executing program 5: sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) [ 230.371668] binder: 8168:8168 ioctl c0306201 200003c0 returned -22 [ 230.379890] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 10:01:33 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000280)={'bond_slave_0\x00'}) [ 230.465593] audit: type=1400 audit(1570356093.899:57): avc: denied { map_read map_write } for pid=8185 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 230.513825] binder: 8191:8191 ioctl 8912 20000000 returned -22 10:01:34 executing program 0: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0x901, [], 0x0}) 10:01:34 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) socket(0x0, 0x0, 0x0) 10:01:34 executing program 2: syz_open_dev$dspn(0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x0, 0x0) socketpair$unix(0x1, 0x100000002, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x12102) r3 = socket$inet6(0xa, 0x3, 0x6) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x10, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x0, 0x8000003}, 0x20) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x8040) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x4000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd0028080}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x1c, r5, 0x1, 0x30bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24044885) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup2(r8, 0xffffffffffffffff) dup(r1) open(&(0x7f0000000400)='./file0\x00', 0x200000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1032}, 0xc, &(0x7f0000000500), 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 10:01:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) getsockopt$sock_buf(r2, 0x1, 0x3d, 0x0, &(0x7f00000002c0)) 10:01:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x21, 0x0, &(0x7f0000000040)) 10:01:34 executing program 1: mount$bpf(0x7fffffffefff, 0x0, 0x0, 0x0, 0x0) [ 230.769970] audit: type=1800 audit(1570356094.199:58): pid=8205 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16588 res=0 10:01:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) getsockopt$sock_buf(r2, 0x1, 0x3d, 0x0, &(0x7f00000002c0)) 10:01:34 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMU\xa8\t\x00', &(0x7f0000000100)='TRUE', 0xffffffffffffff42, 0x0) 10:01:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) capset(&(0x7f00000002c0), 0x0) 10:01:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) 10:01:34 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x1d, r0, &(0x7f0000000240)=""/95, 0x5f) 10:01:34 executing program 0: socket$inet6(0xa, 0x802, 0x0) socket$inet6(0xa, 0x400000003, 0x800000000000003e) inotify_init() socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x100000002, 0x0, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xfff}, 0x0, 0x0) 10:01:34 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 231.139980] audit: type=1800 audit(1570356094.569:59): pid=8242 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16589 res=0 10:01:35 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="00000000c25fbf6fb061dc4ee17cf2813a6e24e73543a88690cbc43400bb6e95a6c6db60f5b76826ff738dde415d42d3ef7b501008f5391e607a275bc4e28fea702df870990f96534d3d7e5b52f06b3abffc40254636ac312ee784271372a3cad99a8998d90e4173619bbdb1392ad7a0978fca4f4f05e915ec0ac46ac5122669b929885b679943e7"], 0x8) 10:01:35 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x29, 0x0, &(0x7f0000000200)) 10:01:35 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:01:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) 10:01:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, &(0x7f00000000c0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) 10:01:35 executing program 0: syz_init_net_socket$ax25(0x3, 0x2, 0xca) 10:01:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000180)={0x13, 0x10, 0xfa00, {0x0, r3}}, 0x18) 10:01:35 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) io_submit(r1, 0x2, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8000000000000000}]) 10:01:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000140)='gfs2\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@commit={'commit', 0x3d, 0x40}}, {@quota_on='quota=on'}]}) 10:01:35 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x6, 0x0, &(0x7f0000000200)=0xfffffe96) 10:01:35 executing program 2: syz_mount_image$bfs(&(0x7f0000000240)='bfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:01:35 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) [ 231.810057] gfs2: not a GFS2 filesystem 10:01:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) 10:01:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_mempolicy(0x0, &(0x7f0000000000), 0x0) 10:01:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0x1, &(0x7f00000001c0)=@raw=[@alu], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r0, 0x0, &(0x7f0000000800)) [ 231.901644] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 231.943392] gfs2: not a GFS2 filesystem 10:01:35 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 10:01:35 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x1d5, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x1d, r3}, 0x10, &(0x7f0000000280)={&(0x7f0000000240)=@can={{0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "418350e01b85354f"}, 0x10}}, 0x0) 10:01:35 executing program 4: mlockall(0xf) 10:01:35 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) timer_create(0x2, 0x0, &(0x7f0000000540)=0x0) timer_settime(r0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 10:01:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x49, 0x0, 0x0) [ 232.048600] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 10:01:35 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@dots='dots'}]}) 10:01:35 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x34, &(0x7f0000000540), 0x194) 10:01:35 executing program 4: openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:01:35 executing program 0: r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x1}) 10:01:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) [ 232.275122] FAT-fs (loop5): bogus number of reserved sectors 10:01:35 executing program 2: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000040)="c9", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x7, r0, 0x0, 0x0, 0x0) [ 232.319061] FAT-fs (loop5): Can't find a valid FAT filesystem 10:01:35 executing program 3: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[{@map_normal='map=normal'}], [{@uid_eq={'uid'}}]}) 10:01:35 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r0, &(0x7f0000000300)=[{{&(0x7f0000000000), 0x10, 0x0}}], 0x1, 0x0) 10:01:35 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) 10:01:35 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x1f, 0x4) [ 232.429616] FAT-fs (loop5): bogus number of reserved sectors [ 232.441632] FAT-fs (loop5): Can't find a valid FAT filesystem 10:01:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 232.482042] audit: type=1400 audit(1570356095.909:60): avc: denied { map } for pid=8363 comm="syz-executor.4" path="/dev/binder4" dev="devtmpfs" ino=950 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 10:01:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0x1, &(0x7f00000001c0)=@raw=[@ldst={0x1}], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x13, 0x0, 0x280) 10:01:36 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x52000, 0x0) 10:01:36 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) r1 = socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) [ 232.675659] ISOFS: Unable to identify CD-ROM format. 10:01:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='acl,nobarrier']) 10:01:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x1d, 0xd, 0xffffffffffffffff) 10:01:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0xae64, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000000)={0x16}) [ 232.842067] gfs2: not a GFS2 filesystem [ 232.853240] ISOFS: Unable to identify CD-ROM format. 10:01:36 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) r1 = socket(0x0, 0x0, 0x0) connect$rose(r1, &(0x7f00000001c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 10:01:36 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:36 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000100)) 10:01:36 executing program 0: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3, 0x0, 0x0, 0x0) 10:01:36 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x87940) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:01:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mlockall(0x0) 10:01:36 executing program 5: mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000000)=0x4, 0xeabb, 0x4) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000040)=0x19, 0x9, 0x4) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0x9, &(0x7f0000ffb000/0x3000)=nil, 0x5) get_mempolicy(&(0x7f0000000100), &(0x7f0000000140), 0x23, &(0x7f0000ffb000/0x2000)=nil, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0\x00') 10:01:36 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x5, 0x1, &(0x7f00000001c0)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffeb}], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote, @loopback, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}) 10:01:36 executing program 5: r0 = socket(0x10, 0x2, 0x0) connect$unix(r0, &(0x7f0000000080)=@abs, 0x6e) 10:01:36 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:36 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) open_by_handle_at(r0, &(0x7f0000000240)={0x8}, 0x0) 10:01:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x56) setresuid(0x0, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x56) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x56) setresuid(0x0, r3, r5) 10:01:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 10:01:36 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)='(selinuxlo\x00') 10:01:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timerfd_create(0x3, 0x0) 10:01:36 executing program 5: mq_notify(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffff}) 10:01:36 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:36 executing program 1: r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) lseek(r0, 0x0, 0x3) 10:01:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) 10:01:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x75, 0x0, &(0x7f0000000100)) 10:01:37 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) sync_file_range(r0, 0x0, 0x0, 0x6) 10:01:37 executing program 5: mq_notify(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}) 10:01:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 10:01:37 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000140)) 10:01:37 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:37 executing program 3: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) 10:01:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3fffffffffffdf5, 0x62, 0x0) 10:01:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8030ae7c, 0x0) 10:01:37 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 233.867714] hfs: unable to parse mount options 10:01:37 executing program 4: capget(0x0, &(0x7f0000000400)) 10:01:37 executing program 1: splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0xa6958e08767387c1) [ 233.980400] hfs: unable to parse mount options 10:01:37 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 10:01:37 executing program 3: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7, 0x20000) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x4) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, 0x0, 0x0, 0x0, 0x0) 10:01:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x48, 0x0, 0x280) 10:01:37 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:37 executing program 0: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e}, 0x120) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7, 0x20000) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140)=@v1={0x2, "37450a1edcfdb9"}, 0x8, 0x4) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x14c80) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) [ 234.154083] audit: type=1400 audit(1570356097.579:61): avc: denied { name_connect } for pid=8532 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 10:01:37 executing program 4: syz_open_dev$loop(0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:37 executing program 5: syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) socket$inet6(0xa, 0x802, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write(r0, &(0x7f0000000600), 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000000)) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x0, 0x0) socketpair$unix(0x1, 0x100000002, 0x0, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 10:01:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) socket$inet6(0xa, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r2}, 0x0, 0x0, 0x0) 10:01:37 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 234.346651] overlayfs: conflicting lowerdir path [ 234.398056] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 234.413269] audit: type=1800 audit(1570356097.839:62): pid=8559 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16637 res=0 10:01:37 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 234.460080] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 234.491879] overlayfs: conflicting lowerdir path [ 234.501086] overlayfs: filesystem on './file0' not supported as upperdir 10:01:37 executing program 5: kexec_load(0x0, 0x0, 0x0, 0x5baf392ccec7b577) [ 234.527670] overlayfs: filesystem on './file0' not supported as upperdir 10:01:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x800, 0x0, 0x0, 0x0, 0x0) 10:01:38 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0xc, @dev, 'teql0\x00'}}, 0x1e) 10:01:38 executing program 0: r0 = syz_open_dev$vbi(&(0x7f00000005c0)='/dev/vbi#\x00', 0x2, 0x2) write$P9_RREADLINK(r0, 0x0, 0x0) 10:01:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0xfc889d166c04cb13, 0x0, 0x0) 10:01:38 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4, "509fd609"}, &(0x7f00000000c0)=0x28) 10:01:38 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000001c80)='./file0\x00', 0x0, 0x0, 0x0, 0xa0000, 0x0) 10:01:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000000)={@rand_addr="fa26a0d81f6d54492860a7eba32bb54c"}, 0x14) 10:01:38 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) pipe2(0x0, 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) 10:01:38 executing program 0: socket$inet6(0xa, 0x802, 0x0) socket$inet6(0xa, 0x400000003, 0x800000000000003e) inotify_init() socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x100000002, 0x0, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xfff}, 0x0, 0x0) 10:01:38 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x8) 10:01:38 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, 0x0, 0x0) 10:01:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_rr_get_interval(0x0, &(0x7f00000000c0)) 10:01:38 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 235.012980] audit: type=1800 audit(1570356098.439:63): pid=8619 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16523 res=0 10:01:38 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000040)) 10:01:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) pipe2(0x0, 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) 10:01:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f0000001200)=ANY=[@ANYBLOB="9feb0100180000000000000028000000280000000b0000000500004000000005080000000b00009e8bc9717802020000000d000000000000010000000044b0d04e6e93b957007605003030"], &(0x7f0000001280)=""/150, 0x4b, 0x96, 0x1}, 0x20) 10:01:38 executing program 3: syz_open_dev$dspn(0x0, 0x0, 0x0) socket$inet6(0xa, 0x802, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200100, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x0, 0x0) socketpair$unix(0x1, 0x100000002, 0x0, &(0x7f0000000040)) r1 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfffffffffffff801, 0x12102) r3 = socket$inet6(0xa, 0x3, 0x6) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r4, &(0x7f0000000240)=0x202, 0x4000000000dc) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f00000000c0)={0x8000, 0x7ff, 0x2}) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="050cfd000000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x4000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd0028080}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x1c, 0x0, 0x1, 0x30bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x24044885) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1032}, 0xc, &(0x7f0000000500)={&(0x7f0000000800)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16, @ANYBLOB="10002dbd7000ffdbdf25020000002400070008000100", @ANYRES32, @ANYBLOB="080088052b0fcecc00240979ad61145f14392b8ac4e74387b6e12f9bc27a85ef460a9fe818c8a18bb8b71a79b4c51479447d64210d86fb415ddd8da0ff53ce9aca44f2a3ebe21c7584be891c117ffebf722e5d7c65196e0d125471b5cc7bbf00"/108, @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c000200000000000000000008000100000000000c00080006000000000000000c0004000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 10:01:38 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:38 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x3, &(0x7f0000000040)='syz_tun\x00'}) 10:01:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) recvfrom$packet(r2, 0x0, 0x0, 0x2, 0x0, 0x0) 10:01:38 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4004510d, 0x0) [ 235.283839] audit: type=1800 audit(1570356098.709:64): pid=8651 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16628 res=0 10:01:38 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) dup2(r1, r0) 10:01:38 executing program 5: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, 0x0, 0x0, 0x2, 0x0) 10:01:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:38 executing program 3: msgrcv(0x0, 0x0, 0x21a, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 10:01:38 executing program 4: r0 = socket(0x2, 0x3, 0x100000000000005) close(r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$unix(0x1, 0x5, 0x0) close(r2) close(r1) pipe(&(0x7f00000000c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r3) close(r4) socket$inet_udplite(0x2, 0x2, 0x88) socket$caif_seqpacket(0x25, 0x5, 0x0) splice(r0, 0x0, r4, 0x0, 0xc0, 0x0) close(r4) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], 0x8) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") 10:01:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet(0x2, 0x2, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0x18, 0x0, &(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRES64=r0, @ANYRESDEC=0x0], @ANYPTR, @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB]], 0x25, 0x0, &(0x7f0000000300)="c35a4fb0d2742cb4c171fa136c130f20e6cdbce2b55b48a04af7d95160696b7387e4a590a7"}) lstat(0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0xfffffffffffffdb0}, 0x8, 0x0) pipe(&(0x7f00000000c0)) 10:01:38 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$IMGETCOUNT(0xffffffffffffffff, 0x80044943, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) dup2(r0, r1) ioctl$int_in(r0, 0x5452, &(0x7f0000e35ff8)=0xba5e) r2 = getpgrp(0x0) fcntl$setown(r0, 0x8, r2) fcntl$setsig(r1, 0xa, 0x15) r3 = gettid() tkill(r3, 0x102080000000013) 10:01:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:39 executing program 3: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000002dc0)={{}, {0x0, 0x989680}}, 0x0) 10:01:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 235.652905] audit: type=1400 audit(1570356099.079:65): avc: denied { wake_alarm } for pid=8686 comm="syz-executor.3" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 10:01:39 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:39 executing program 3: r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='4'], 0x1) lseek(r0, 0x0, 0x3) 10:01:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000000)=""/69, &(0x7f0000000080)=0x45) 10:01:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000040)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @empty}}}, 0x118) 10:01:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x11, 0x0, 0x0, 0x0, 0x0) 10:01:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff0000008f, 0x62, 0x0) 10:01:39 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "b3cf3412"}, 0x0, 0x0, @planes=0x0, 0x4}) 10:01:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) 10:01:39 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000100", @ANYRES32=0x0], &(0x7f0000000180)=0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000040)=r3, 0x4) 10:01:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x12, 0x0, 0x0) 10:01:39 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') setxattr$security_smack_transmute(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 10:01:39 executing program 0: timer_create(0x7, 0x0, &(0x7f0000000540)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_gettime(0x0, 0x0) 10:01:39 executing program 4: socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x40000107}]}) 10:01:39 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e}, 0x120) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x14c80) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:39 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xff0f0200) 10:01:39 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') mount$overlay(0x40005d, &(0x7f0000000000)='./file1\x00', 0x0, 0x10c0, 0x0) 10:01:40 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x18, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="00000000c25fbf6fb061dc4ee17cf2813a6e24e73543a88690cbc43400bb6e95a6c6db60f5b76826ff738dde415d42d3ef7b501008f5391e607a275bc4e28fea702df870990f96534d3d7e5b52f06b3abffc40254636ac312ee784271372a3cad99a8998d90e4173619bbdb1392ad7a0978fca4f4f05e915ec0ac46ac5122669b929885b679943e7"], 0x8) 10:01:40 executing program 0: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) ioctl$PPPIOCGFLAGS(r1, 0x8004745a, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) [ 236.707413] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 10:01:40 executing program 4: socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x40000107}]}) 10:01:40 executing program 0: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0}, 0x120) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}]}, 0x44, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:40 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 236.802061] overlayfs: filesystem on './file0' not supported as upperdir 10:01:40 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e}, 0x120) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x14c80) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:40 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) pipe(&(0x7f0000000340)={0xffffffffffffffff}) fstat(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000080)='./file0\x00', r1, r3) 10:01:40 executing program 4: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0xd}, 0x0) [ 236.988853] audit: type=1400 audit(1570356100.429:66): avc: denied { getopt } for pid=8791 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 236.999175] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 237.117678] overlayfs: filesystem on './file0' not supported as upperdir [ 237.200079] overlayfs: conflicting lowerdir path 10:01:40 executing program 3: ustat(0x5, &(0x7f0000000040)) 10:01:40 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:40 executing program 5: r0 = syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000180)={0x0, 0x0, "ff59f5764259dde62190cf44d70e2427b4dcf6aba6b35797"}) 10:01:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_robust_list(0x0, 0x0, &(0x7f00000001c0)) 10:01:40 executing program 0: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0}, 0x120) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}]}, 0x44, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:40 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e}, 0x120) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x14c80) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:40 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$tipc(r0, &(0x7f0000000040)=@id, 0x10) 10:01:41 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 237.524450] overlayfs: conflicting lowerdir path 10:01:41 executing program 4: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r0, r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x18, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="00000000c25fbf6fb061dc4ee17cf2813a6e24e73543a88690cbc43400bb6e95a6c6db60f5b76826ff738dde415d42d3ef7b501008f5391e607a275bc4e28fea702df870990f96534d3d7e5b52f06b3abffc40254636ac312ee784271372a3cad99a8998d90e4173619bbdb1392ad7a0978fca4f4f05e915ec0ac46ac5122669b929885b679943e7"], 0x8) [ 237.574907] overlayfs: conflicting lowerdir path 10:01:41 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x30) 10:01:41 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="01"], 0x1) lseek(r0, 0x0, 0x3) 10:01:41 executing program 1: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e}, 0x120) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x14c80) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:41 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:41 executing program 0: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0}, 0x120) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}]}, 0x44, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:41 executing program 4: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000001c0)=""/100) 10:01:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_MM_EXE_FILE(0x24, 0xd, 0xffffffffffffffff) 10:01:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)) 10:01:41 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 237.935963] overlayfs: conflicting lowerdir path [ 237.956238] overlayfs: conflicting lowerdir path 10:01:41 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:41 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x11, 0x0, 0x0) 10:01:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_notify(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x2}) 10:01:41 executing program 5: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xec8498a63b4bd6ea, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b702000003400000bfa300000000000007020000fffeffff7a03f0fff8ffffff79a4f0ff00000000b7060000ffffffffad640500000000006502faff000000002404000001007d60b5030000001000006a0a00fe000000008500000026000000b70000000000004095000000000000001da5ad3548ebb63d18db6a1c72c21c9b767ae5308fbcd5c5e4a5ad1065b572c2c9ff215ac6e0700c2ceaea4c1dc908abb6e7325ec1956bd8660bf36628df4490046261dbb74ea2d1f754c0a15750ab9a78fc00000000247d52d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a357c9e8eb040c50287c37a7f4182f32333b08c6e497687e30a4daea5cac0ceafdb9a2eeb02a1f5104d16ddba49b4d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed7afdb00bb1321ea5e82ae5ba2c42a5e2bdfd253d5df768d0cb30a5bb8c13d5b47912e722356893f3205a5f6ef456c0fd38abda032ed720e5dc29c754723a3080e085fb24d6f163185bf6e394609f99c8baa39ada813607a619e2411aeb3d4a4817330302ff67d6f5ef8be3c26a20775730c60df3a48e9c647cf98ded76c7d387537a7ebe706667ea078c8f29a4ce1f86ee833b6c3a17a194bf2ddb5b014c66b3c6f93facd309b5b5faccf76c6cd10f650cb84aadbf6583fbd85d7bee1b6839721a7fd6fb3d4ee82e7a69f3d4964645bef9b34e12a27edd628b7af013f790da50d282f000000000000000ca70de9eafc0c4c2373ebbd8cd330ebf5de1831fad1853ab3610dc1b74209681b4f73cbdccfcbce3a2ba25b4e8fedb6e38f42311ab3581e4e4b13fc4b77add8a596487cf5736ada5457b6cd363a09f2562d3809b989af7db92edaf9de4096ee20a0ea5d93c8b9a3aca793a2907396bf19aee0632e116e0dd52fd776e7707f5b177b3527f1fb9b6222e0578f52305024b22a5b658df8a2a7a3b783dda46e8a720991343d715522e90c8a1b52c153a0e41aacdddb2b066e4e6543f4fcd8f6b96c98f4aa1e1a2b321c9528fcdb7b8d935fb3c482607b895700acbb09000bda28fd34010e7f4808b8e949e1b21bf735d35209c755f6497a69ce9146f171b26dd2519f50ba93d3b1a37d11ed59e600e7d5e7bbf73058ad842eb533d353b85f7cee0ec104db2bb126cf6e067687e1bf9dae8044187027871207b533fcd22e5e88d107b3e0f0998c709aacd"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:01:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0x801}, 0x20}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x8) 10:01:41 executing program 0: write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0}, 0x120) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}]}, 0x44, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:41 executing program 4: r0 = getpid() waitid(0x1, r0, 0x0, 0x8, 0x0) 10:01:41 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x10, &(0x7f0000000000), 0xc) 10:01:41 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000180)) 10:01:41 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000300)={0x0}) 10:01:41 executing program 4: r0 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, 0x0, 0x0) [ 238.286330] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 10:01:41 executing program 3: socket$can_raw(0x2c, 0x3, 0x1) 10:01:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x38, 0x0, 0x0) 10:01:41 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:41 executing program 4: r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, r1) 10:01:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)=[{0x0}, {&(0x7f0000000300)='&', 0x1}, {&(0x7f0000000180)="97", 0x1}], 0x3}, 0x0) 10:01:41 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:41 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0}, 0x120) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}]}, 0x4c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:42 executing program 0: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0}, 0x120) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140), 0x1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) 10:01:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) 10:01:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@local}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 10:01:42 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) 10:01:42 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@sbsector={'sbsector'}}]}) 10:01:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x78, 0x0, 0x0) [ 238.729126] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 10:01:42 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240)=0x202, 0x4000000000dc) [ 238.782677] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 10:01:42 executing program 3: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000001c0)) [ 238.830459] overlayfs: filesystem on './file0' not supported as upperdir [ 238.870336] overlayfs: filesystem on './file0' not supported as upperdir 10:01:42 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 10:01:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvfrom$packet(r0, 0x0, 0x0, 0x2950812ba9d92071, 0x0, 0x0) 10:01:42 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000080)=ANY=[@ANYBLOB="b69146954f534d9b660d46c4833b4d61"], 0x10) 10:01:42 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:01:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x1000000002711, 0x0, &(0x7f00000000c0)) [ 238.943281] ISOFS: Unable to identify CD-ROM format. 10:01:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote, @loopback, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}) [ 239.101220] ISOFS: Unable to identify CD-ROM format. 10:01:42 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) 10:01:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x1000000002711, 0x0, &(0x7f00000000c0)) 10:01:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, 0x0) 10:01:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x40000107}]}) 10:01:42 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 10:01:42 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000300)=0x3, 0x2) 10:01:43 executing program 5: ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e}, 0x120) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7, 0x20000) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140)=@v1={0x2, "37450a1edcfdb9"}, 0x8, 0x4) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x14c80) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 10:01:43 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) 10:01:43 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) 10:01:43 executing program 1: socket$can_raw(0x1d, 0x3, 0x5) 10:01:43 executing program 3: socket$inet6(0xa, 0x802, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x0, 0x0) socketpair$unix(0x1, 0x100000002, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 10:01:43 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) write(r0, &(0x7f0000000340)='/', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) 10:01:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="19255629935ae8facafe5705fbf6c062", 0x10) [ 239.993079] audit: type=1800 audit(1570356103.399:67): pid=9030 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16705 res=0 10:01:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x28, r1, 0x21, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x28}}, 0x0) 10:01:43 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, 0x0) [ 240.039933] can: request_module (can-proto-5) failed. [ 240.123529] can: request_module (can-proto-5) failed. 10:01:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0xb, r0, &(0x7f0000000240)=""/95, 0x5f) 10:01:43 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x6, 0x0, &(0x7f0000000200)) [ 240.145143] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 10:01:43 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x12, 0x0, &(0x7f0000000100)) [ 240.259019] overlayfs: workdir and upperdir must reside under the same mount 10:01:43 executing program 5: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f30501000a000600020423dcffdf00", 0x1f) 10:01:43 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) chown(&(0x7f0000000080)='./file0\x00', r1, 0x0) 10:01:43 executing program 4: rt_sigpending(&(0x7f00000000c0), 0xffffffffffffff58) 10:01:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x56) setresuid(0x0, r1, 0x0) setpriority(0x0, 0x0, 0x0) 10:01:43 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) 10:01:43 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xff0f0300) 10:01:43 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000140)) 10:01:43 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syzkaller0\x00', &(0x7f00000000c0)=@ethtool_drvinfo={0x3, "ddb849f4bca376c565e12c8100496ee1a23b59e85e1422245d1fde80c19159a6", "f1d6d73d48ad4cc38a424753d1f435f7ddceea547e01fc0e84596005d0478b66", "e14e2e4b440d1698a97d091c7c5bfd6ddbc50bb09cf1df51026f9df489e2eaec", "15ee62dbd6365c4e692dc1b0b16ff49bb943733ded8cc863ee0b65802cfe8f9a", "b40abf51348aedb06b1dddf7d827c5e032e88e5c245065740c36bd732e0df56e", "8fe454aefbe8b136579bb673"}}) 10:01:43 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x77, &(0x7f0000000200)=@assoc_value, 0x8) 10:01:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r0, 0x0, 0x0) 10:01:44 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0xb, 0x0, &(0x7f0000000100)) [ 240.554115] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 10:01:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) alarm(0x9) 10:01:44 executing program 5: shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/245) 10:01:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) 10:01:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$MSG_STAT(0x0, 0xb, 0x0) 10:01:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, 0x0, 0x0) 10:01:44 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="01"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 10:01:44 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 10:01:44 executing program 2: request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='keyring\x00', 0xffffffffffffffff) 10:01:44 executing program 0: semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f00000000c0)) 10:01:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:01:44 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 10:01:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) 10:01:44 executing program 4: timerfd_settime(0xffffffffffffffff, 0x3b9ac9ff, &(0x7f0000002dc0)={{}, {0x0, 0x1c9c380}}, 0x0) 10:01:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000240)=0x202, 0x4000000000dc) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="050cfd000000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) dup(0xffffffffffffffff) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1032}, 0xc, &(0x7f0000000500)={&(0x7f0000000800)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16, @ANYBLOB="10002dbd7000ffdbdf25020000002400070008000100", @ANYRES32, @ANYBLOB="080088052b0fcecc00240979ad61145f14392b8ac4e74387b6e12f9bc27a85ef460a9fe818c8a18bb8b71a79b4c51479447d64210d86fb415ddd8da0ff53ce9aca44f2a3ebe21c7584be891c117ffebf722e5d7c65196e0d125471b5cc7bbf00"/108, @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c000200000000000000000008000100000000000c00080006000000000000000c0004000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) 10:01:44 executing program 2: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f0000000080)=""/4096, &(0x7f0000001140)=0x1000) 10:01:44 executing program 4: timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000002dc0)={{}, {0x0, 0x1c9c380}}, 0x0) 10:01:44 executing program 5: perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30922, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2040}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 10:01:44 executing program 3: r0 = socket$isdn_base(0x22, 0x3, 0x0) shutdown(r0, 0x0) 10:01:44 executing program 1: r0 = memfd_create(&(0x7f00000002c0)='system.sockprotoname\x00', 0x0) fremovexattr(r0, &(0x7f0000000380)=@random={'security.', '\x00\xef\x01\x98\xa7\x7f\xb9\xd2\xe6[\x90\xe5 \xeb\xed\f\xba\x9b\xa5\x80\xe8*\x02L|9\xc3\xb0\xec\x01it\xec\x00\xa3\x11JF\x8a\xd0\x1d\xd1\xbd\xc4Z\x84\v\xd4G\x182\xa1\xd5\xe8\xeba\x8f_c0 \xb7\xb0\xe0\x87\xeb\x1e\xd3%\xc9v\xe5\x0f|\xa3D\xcf\bvN\xfbn\xcce\xcbD\xd9V'}) 10:01:44 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x80108906, 0x0) 10:01:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x0, 0x3}) socket$inet6(0xa, 0x0, 0x0) 10:01:45 executing program 4: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2}) 10:01:45 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, 0x0) 10:01:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x18, 0x0, 0x280) 10:01:45 executing program 3: bpf$PROG_LOAD(0x14, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0xc, &(0x7f0000000200)=@assoc_value, 0x8) 10:01:45 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x48, 0x0, 0x0) 10:01:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$dh_compute(0x1c, 0x0, 0x0, 0x0, 0x0) 10:01:45 executing program 1: syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@type={'type', 0x3d, "4ffcd5e1"}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}]}) [ 242.210339] hfs: unable to parse mount options 10:01:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000000)={0x0, 0x3}) 10:01:45 executing program 5: keyctl$get_security(0x7ffff, 0x0, 0x0, 0x0) 10:01:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000100", @ANYRES32=0x0], &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0xc, &(0x7f0000000200)=@assoc_value={r2}, 0x8) 10:01:45 executing program 3: io_setup(0x3, &(0x7f00000000c0)=0x0) io_destroy(r0) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 10:01:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x8, &(0x7f0000000200)=@assoc_value, 0x8) [ 242.305798] hfs: unable to parse mount options 10:01:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) 10:01:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'teql0\x00', 0x0}) 10:01:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmmsg(r1, &(0x7f0000001740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 10:01:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0xc}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 10:01:45 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000280)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x10) 10:01:46 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_security(0xb, r0, 0x0, 0x0) 10:01:46 executing program 3: add_key(&(0x7f0000000180)='pkcs7_test\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 10:01:46 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[], [{@uid_eq={'uid'}}]}) 10:01:46 executing program 2: syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800008, 0x0) syz_mount_image$minix(0x0, &(0x7f0000001500)='./file0\x00', 0x0, 0x0, &(0x7f0000001580), 0x0, 0x0) 10:01:46 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='ecryptfs\x00', 0x0, &(0x7f0000000500)='mem\x00\x00\x00\x00\x00\x00\a\x13') 10:01:46 executing program 0: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='%', 0x1, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000001c0)={r1}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'wp256-generic\x00'}}, 0x0, 0x0) 10:01:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000100", @ANYRES32=0x0], &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x75, &(0x7f0000000200)=@assoc_value={r2}, 0x8) [ 242.780037] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) [ 242.806936] ISOFS: Unable to identify CD-ROM format. [ 242.821428] ecryptfs_parse_options: eCryptfs: unrecognized option [mem] [ 242.828802] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 242.855563] Error parsing options; rc = [-22] 10:01:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x7, 0x0) fsetxattr$security_evm(r0, 0x0, 0x0, 0x0, 0x4) 10:01:46 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fallocate(r0, 0x40, 0x0, 0xc532) [ 242.942446] ISOFS: Unable to identify CD-ROM format. [ 242.993216] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 10:01:46 executing program 4: statx(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) 10:01:46 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r1}, 0xc) write$binfmt_misc(r2, 0x0, 0x0) 10:01:46 executing program 1: capget(&(0x7f00000003c0)={0x20080522}, &(0x7f0000000400)) 10:01:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_script(r0, &(0x7f0000000100)={'#! ', './file0', [], 0xa, "effcb2e719"}, 0x10) 10:01:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000100", @ANYRES32=0x0], &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x7c, &(0x7f0000000000)={r2}, 0xc) 10:01:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x14, r1, 0x101, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) 10:01:46 executing program 0: sysfs$2(0x2, 0x1ac03083, 0x0) 10:01:46 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000100", @ANYRES32=0x0], &(0x7f0000000180)=0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x7d, &(0x7f0000000200)=@assoc_value={r2}, 0x8) 10:01:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:01:46 executing program 1: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) write$binfmt_script(r0, 0x0, 0x0) 10:01:46 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r1, &(0x7f00000002c0), 0x10) recvmmsg(r1, &(0x7f0000005000)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10001, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) 10:01:46 executing program 4: tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10) 10:01:47 executing program 0: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{}, {0x0, 0xfffffffffffffff8}], 0x2) semop(r0, &(0x7f0000000240), 0x2) 10:01:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 10:01:47 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x4bc9293deaa5c063) 10:01:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000421, 0x1) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000200)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$VFIO_IOMMU_GET_INFO(0xffffffffffffffff, 0x3b70, &(0x7f0000000040)={0x10}) write(r0, &(0x7f0000000340)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x2000000000011, r0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) 10:01:47 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0xfffbc000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 10:01:47 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040)) 10:01:47 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x30, 0x0, &(0x7f0000000200)) 10:01:47 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 10:01:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)) 10:01:47 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r0, 0x0, 0x26, &(0x7f0000000140)='\xc4obF\x03\xbe_!\xde]A?\xeb\x03cpu'}, 0x11) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r4 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = memfd_create(&(0x7f0000000440)='\xb3', 0x1) write$FUSE_DIRENT(r5, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r5, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r6, 0x0, 0x0, 0x0) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2, &(0x7f0000001fd8)=ANY=[@ANYBLOB="edcccd5f141f000072baadc0d9b0b9ec85000000a70000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) r9 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r9, r7, 0x0, 0x26, &(0x7f0000000140)='\xc4obF\x03\xbe_!\xde]A?\xeb\x03cpu'}, 0x11) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x10001, 0x9, 0x0, 0x10001, 0x0, 0x10003, 0x0, 0x0, 0x7, 0x0, 0xd0, 0xfffffffffffffff7, 0xfffffffffffff881, 0x100000001, 0x0, 0x0, 0x6, 0x1000, 0x8, 0x3, 0x8, 0x0, 0x0, 0x1, 0x627, 0x0, 0x0, 0x80000001, 0x0, 0x800, 0x1, 0x3f, 0x0, 0xfffffffffffffe00, 0x800, 0x8000, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x7, 0xc2}, 0x0, 0xe7, 0x1, 0x1, 0x68, 0x7f, 0x8001}, r9, 0x0, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket(0xb45df6c90bc1df2f, 0x0, 0x81) socket$packet(0x11, 0x2, 0x300) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(r10, &(0x7f0000000200)=""/39, 0x27, 0x0) ioctl$TUNSETFILTEREBPF(r10, 0x800454e1, &(0x7f0000000400)=r6) timer_delete(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000200)=""/31, 0x1f, 0x100, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000300)) 10:01:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000001400)={0x0, 0x2cd, &(0x7f00000013c0)={&(0x7f0000000000)={0x24, 0x17, 0x101, 0x0, 0x0, {0x5}, [@nested={0x10, 0xa, [@typed={0xc, 0x0, @u64}]}]}, 0x24}}, 0x0) getegid() setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) 10:01:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)="13", 0x1}], 0x1, 0x8180a) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, 0x0, 0x20000102000007) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000340)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2b) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 10:01:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) pread64(0xffffffffffffffff, &(0x7f0000000200)=""/39, 0x27, 0x0) dup2(r0, r1) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, 0x0) 10:01:47 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_FORWARD_DELAY={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) 10:01:47 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_open_pts(r0, 0x0) 10:01:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)={[], [{@uid_eq={'uid'}}]}) 10:01:47 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14, 0x7, 0x1, 0x319}, 0x14}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xad4ea49098fe12, 0x0) 10:01:48 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14, 0x7, 0x1, 0x319}, 0x14}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xad4ea49098fe12, 0x0) 10:01:48 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14, 0x7, 0x1, 0x319}, 0x14}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0xad4ea49098fe12, 0x0) [ 244.750178] ISOFS: Unable to identify CD-ROM format. 10:01:48 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000400)) [ 244.844495] protocol 88fb is buggy, dev hsr_slave_0 [ 244.849881] protocol 88fb is buggy, dev hsr_slave_1 [ 244.853376] ISOFS: Unable to identify CD-ROM format. 10:01:48 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff86, 0xa}}}}}, 0x0) 10:01:48 executing program 1: accept$inet6(0xffffffffffffffff, 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x84\xe0\xda\x82a\xbe\x18O\x17\x1b\\\x143\x06v\x9b=>\xc1\xd9\x06\x00\x05\xf7\xae\xce\xbeA,j5\xac\xf5\xf0&\xc5$\x951QC\x87\x9f\xe0};\xac\xb7k>0\xce\xcd~\xd766*\fo=Cg&[\x8b\xe2\xbd\xe9\x16\xc6\x1e\x97e]\xb0\xed\xe7I\x18\x96RS\x10\x8cyr\xb7\xcf', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r0, 0x0) [ 244.924924] protocol 88fb is buggy, dev hsr_slave_0 [ 244.931191] protocol 88fb is buggy, dev hsr_slave_1 10:01:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) timer_create(0x2, &(0x7f0000000140)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x1, &(0x7f0000000140)={{}, {0x0, 0x9}}, 0x0) 10:01:48 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4000000004, 0x4, 0xf04}, 0x3c) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_FORWARD_DELAY={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) 10:01:49 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x80, 0x0, 0x4, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1d0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}]}, 0x80}}, 0x0) getegid() r2 = socket$netlink(0x10, 0x3, 0x0) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) syncfs(r3) dup2(r2, r3) 10:01:49 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_FORWARD_DELAY={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) 10:01:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)="13", 0x1}], 0x1, 0x8180a) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r2, 0x0, 0x20000102000007) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000340)) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x4, 0x4dd84e5ced92818f}, 0x4) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) splice(r4, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000100), 0x79f1, 0x2) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2b) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000140)={0xe, 0x0, 0x9, 0x4c, 0xf, "b5c3d75382023a7d08d37555d5199f"}, 0x1b) ioctl$LOOP_CLR_FD(r0, 0x4c01) 10:01:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000000)={0x0, 0x0}) 10:01:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) [ 246.293880] print_req_error: I/O error, dev loop0, sector 640 [ 246.300423] Buffer I/O error on dev loop0, logical block 80, lost async page write [ 246.309046] print_req_error: I/O error, dev loop0, sector 648 [ 246.315025] Buffer I/O error on dev loop0, logical block 81, lost async page write [ 246.322767] print_req_error: I/O error, dev loop0, sector 656 [ 246.328711] Buffer I/O error on dev loop0, logical block 82, lost async page write [ 246.336710] print_req_error: I/O error, dev loop0, sector 664 [ 246.342599] Buffer I/O error on dev loop0, logical block 83, lost async page write [ 246.350383] print_req_error: I/O error, dev loop0, sector 672 [ 246.356318] Buffer I/O error on dev loop0, logical block 84, lost async page write [ 246.364090] print_req_error: I/O error, dev loop0, sector 680 [ 246.370196] Buffer I/O error on dev loop0, logical block 85, lost async page write [ 246.378082] print_req_error: I/O error, dev loop0, sector 688 [ 246.384149] Buffer I/O error on dev loop0, logical block 86, lost async page write [ 246.391990] print_req_error: I/O error, dev loop0, sector 696 [ 246.397937] Buffer I/O error on dev loop0, logical block 87, lost async page write [ 246.405874] print_req_error: I/O error, dev loop0, sector 704 [ 246.411773] Buffer I/O error on dev loop0, logical block 88, lost async page write [ 246.419594] print_req_error: I/O error, dev loop0, sector 712 [ 246.425576] Buffer I/O error on dev loop0, logical block 89, lost async page write 10:01:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x84\xe0\xda\x82a\xbe\x18O\x17\x1b\\\x143\x06v\x9b=>\xc1\xd9\x06\x00\x05\xf7\xae\xce\xbeA,j5\xac\xf5\xf0&\xc5$\x951QC\x87\x9f\xe0};\xac\xb7k>0\xce\xcd~\xd766*\fo=Cg&[\x8b\xe2\xbd\xe9\x16\xc6\x1e\x97e]\xb0\xed\xe7I\x18\x96RS\x10\x8cyr\xb7\xcf', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:01:49 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x511100, 0x1) execveat(r1, &(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000840)=[0x0], 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:49 executing program 2: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_FORWARD_DELAY={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) 10:01:50 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='pids.max\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) sendfile(r5, r1, 0x0, 0x8) 10:01:50 executing program 3: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@mode={'mode'}}]}) getpid() r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) 10:01:50 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x511100, 0x1) execveat(r1, &(0x7f0000000300)='./file0\x00', 0x0, &(0x7f0000000840)=[0x0], 0x0) getdents64(r0, &(0x7f00000001c0)=""/250, 0xfa) 10:01:50 executing program 5: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x26) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xffffffff, 0x0, 0x146}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x9, r1, 0x0, 0x0) 10:01:50 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@dev}, {@in6=@dev, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}}, 0x0) 10:01:50 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) shmdt(0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 10:01:50 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000140)=[{}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x21f0, 0x32, 0x0, 0x1b) 10:01:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) prctl$PR_GET_KEEPCAPS(0x7) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) pipe(&(0x7f0000000500)) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000280)='<') vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 10:01:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000140)={0x0, 0x81, 0x9}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000000000002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000010005fba00000100f30000a89c8aeeb1", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) 10:01:50 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000080)='\x00\x00\x00\x01\x00\x00\x00\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4e\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c') ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000440)='\x00') 10:01:50 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292fdfe740aba82d39d236ab243347a178fb1fb08609f55c860b7274ce37fba681b500d0c814f800b8421a484e65b37e8e638e4a94339e"], 0x62) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000000)={0x7}, 0x7) lseek(0xffffffffffffffff, 0x0, 0x3) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$TIOCGDEV(r0, 0x80045432, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) clock_getres(0x3, &(0x7f0000000000)) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 10:01:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000001c0)=""/139) 10:01:50 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_FORWARD_DELAY={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) [ 247.458393] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 247.477081] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 10:01:51 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) utimes(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={{0x0, 0x2710}}) 10:01:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f0000000100)=""/179, 0x2c9) 10:01:51 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='ppp\x12+\x00\x00net1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e77e6e560000f9fff77711be18a3d918e000"}) 10:01:51 executing program 1: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000140)='\xc4obF\x03\xbe_!\xde]A?\xeb\x03cpu'}, 0x11) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = memfd_create(&(0x7f0000000440)='\xb3', 0x1) write$FUSE_DIRENT(r3, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r3, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000001fd8)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r5, 0x0, 0x26, &(0x7f0000000140)='\xc4obF\x03\xbe_!\xde]A?\xeb\x03cpu'}, 0x11) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x10001, 0x9, 0x2d5, 0x10001, 0x0, 0x10003, 0x0, 0x0, 0x7, 0x0, 0xd0, 0xfffffffffffffff7, 0xfffffffffffff881, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0xfffffffffffffe00, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x0, 0xc2}, 0x0, 0xe7, 0x1, 0x0, 0x68, 0x7f, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280), 0x1c) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000200)=""/31, 0x1f, 0x100, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) 10:01:51 executing program 0: capget(&(0x7f00000003c0)={0x20080522}, 0x0) 10:01:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000001c0), &(0x7f00000001c0)=""/108}, 0x48) 10:01:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 247.971505] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 248.019703] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 248.054771] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 10:01:51 executing program 5: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000500)={0x0, 0x0}) r1 = gettid() stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() r4 = signalfd4(0xffffffffffffffff, &(0x7f00000007c0)={0x1}, 0x8, 0x80000) r5 = getpgid(r0) fstat(0xffffffffffffffff, &(0x7f0000000b80)) r6 = getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)=[{&(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @rights={{0x10}}], 0x30, 0x93644e44be1a86db}, {&(0x7f0000000840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000b40)=[{&(0x7f00000008c0)="f40196ff2402330668e7192b74894fcef7be0aef4589ce6dfd9f2b41610d9de22ce534c41d456bf963a3a6197560fb34aeed4a39cf84eec1088479dfb3bc606af3", 0x41}, {&(0x7f0000000940)="c48b3e54b1244c85c3e5fcec93331ffd9599cdc77463a64c6f4fc4abd308ad809d833fd1c62ab6ee011f599b4cff4bb09ab1e2a7b4acc9a0d9a2d8dbac0907ffe3a2d653f38398a02c8906b4daf819ce467e8d47034010bb7b301dd2d10a47a511c3a81da409fb19e4f1", 0x6a}, {&(0x7f0000000a00)="63e3f0830a0135e9d435ca6186f90e519e47f91cd3f875943ee37689638a59d9725f6895b1654ffdc67ced67f8b06ce941b8f02135e98042554e5f41d12fae1f2ddf9c5208a321b0b0406ba63e60dd14ba74269b3a62ba8e3499b113c5a2d68a219767", 0x63}, {&(0x7f0000000a80)="c00981b1fb016ef3d6b415c41fef5cffc0253109102bb1eeb752bcf8d578c41548d384a47e531abbd104e383c876b648aecc9066ded0da407f3a8ddd358b55b8bf491b76527f783d192e050dfcfd88c5f0d84b519cd195865317c86502378ce1c5624212495e43463ebd3aed249193f23ce7fb2b227f3e15072b95fac15217c14346c72add3fee7bbb8ab3febf73a27fc392c3af2ed04b1165070eb4ce8f37a8d9addf413dece77d7aee49fb24367473b5b381260b38279ba77d", 0xba}], 0x4, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {r5}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, r6}}}], 0x40, 0x4}], 0x2, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000cc0)=0x1000000000000000) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000d80)=r1) 10:01:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x3, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 10:01:51 executing program 1: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r0, 0xffffffffffffffff, 0x0, 0x26, &(0x7f0000000140)='\xc4obF\x03\xbe_!\xde]A?\xeb\x03cpu'}, 0x11) timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = memfd_create(&(0x7f0000000440)='\xb3', 0x1) write$FUSE_DIRENT(r3, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r3, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pread64(r4, 0x0, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000001fd8)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r5, 0x0, 0x26, &(0x7f0000000140)='\xc4obF\x03\xbe_!\xde]A?\xeb\x03cpu'}, 0x11) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x10001, 0x9, 0x2d5, 0x10001, 0x0, 0x10003, 0x0, 0x0, 0x7, 0x0, 0xd0, 0xfffffffffffffff7, 0xfffffffffffff881, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, 0x0, 0xfffffffffffffe00, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x0, 0xc2}, 0x0, 0xe7, 0x1, 0x0, 0x68, 0x7f, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280), 0x1c) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000200)=""/31, 0x1f, 0x100, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) 10:01:51 executing program 0: futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 10:01:51 executing program 4: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0xb, 0x44031, 0xffffffffffffffff, 0x0) futex(0x0, 0x1000000000000085, 0x0, 0x0, &(0x7f0000000000), 0x0) 10:01:51 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_FORWARD_DELAY={0x8, 0x2}]}}}]}, 0x3c}}, 0x0) 10:01:51 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x20) 10:01:51 executing program 2: clone(0x1000000000011, &(0x7f0000000140), 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) waitid(0x0, 0x0, 0x0, 0x401000004, &(0x7f0000000440)) 10:01:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r0, &(0x7f0000000640), 0x0}, 0x20) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 10:01:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x2, 0x2c, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[@routing={0x0, 0x0, 0x0, 0x0, 0x0, [@mcast2, @empty, @remote, @remote, @remote, @loopback]}, @fragment], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}, {"96a72d4d173ccb2160e11b0cbc6bcefc6657039b32783c914e10f09da6c3b36129334362d74b2403c0b07a2a08b78acf4614c9275a84b230ecde6458153bb58fa05736df2b80b6e4"}}}}}}}, 0x0) 10:01:51 executing program 3: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) 10:01:51 executing program 4: 10:01:52 executing program 1: 10:01:52 executing program 0: 10:01:52 executing program 3: r0 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 10:01:52 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='maps\x00') ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) mknod$loop(0x0, 0x0, 0x1) pipe2$9p(0x0, 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) 10:01:52 executing program 2: socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendto(r0, &(0x7f00000001c0), 0x0, 0x8f0, &(0x7f00000000c0)=ANY=[], 0x0) 10:01:52 executing program 1: 10:01:52 executing program 4: 10:01:52 executing program 0: 10:01:52 executing program 5: 10:01:52 executing program 4: 10:01:52 executing program 1: 10:01:52 executing program 0: 10:01:52 executing program 2: 10:01:52 executing program 5: 10:01:52 executing program 3: 10:01:52 executing program 4: 10:01:52 executing program 0: 10:01:52 executing program 5: 10:01:52 executing program 2: 10:01:52 executing program 1: 10:01:53 executing program 1: 10:01:53 executing program 2: 10:01:53 executing program 4: 10:01:53 executing program 5: 10:01:53 executing program 0: 10:01:53 executing program 3: 10:01:53 executing program 1: 10:01:53 executing program 4: 10:01:53 executing program 2: 10:01:53 executing program 0: 10:01:53 executing program 5: 10:01:53 executing program 1: 10:01:53 executing program 2: 10:01:53 executing program 0: 10:01:53 executing program 4: 10:01:53 executing program 3: 10:01:53 executing program 5: 10:01:53 executing program 4: 10:01:53 executing program 2: 10:01:53 executing program 0: 10:01:53 executing program 1: 10:01:53 executing program 3: 10:01:53 executing program 4: 10:01:53 executing program 5: 10:01:53 executing program 1: 10:01:53 executing program 3: 10:01:53 executing program 2: 10:01:53 executing program 0: 10:01:53 executing program 5: 10:01:53 executing program 2: 10:01:53 executing program 4: 10:01:53 executing program 1: 10:01:53 executing program 3: 10:01:53 executing program 5: 10:01:53 executing program 0: 10:01:53 executing program 2: 10:01:53 executing program 4: 10:01:53 executing program 1: 10:01:54 executing program 3: 10:01:54 executing program 5: 10:01:54 executing program 0: 10:01:54 executing program 2: 10:01:54 executing program 1: 10:01:54 executing program 4: 10:01:54 executing program 3: 10:01:54 executing program 5: 10:01:54 executing program 2: 10:01:54 executing program 4: 10:01:54 executing program 0: 10:01:54 executing program 1: 10:01:54 executing program 4: 10:01:54 executing program 2: 10:01:54 executing program 0: 10:01:54 executing program 1: 10:01:54 executing program 3: 10:01:54 executing program 5: 10:01:54 executing program 1: 10:01:54 executing program 2: 10:01:54 executing program 4: 10:01:54 executing program 0: 10:01:54 executing program 5: 10:01:54 executing program 3: 10:01:54 executing program 1: 10:01:54 executing program 2: 10:01:54 executing program 4: 10:01:54 executing program 5: 10:01:54 executing program 3: 10:01:54 executing program 1: 10:01:54 executing program 4: 10:01:54 executing program 0: 10:01:54 executing program 2: 10:01:54 executing program 5: 10:01:54 executing program 3: 10:01:54 executing program 4: 10:01:54 executing program 1: 10:01:55 executing program 5: 10:01:55 executing program 2: 10:01:55 executing program 0: 10:01:55 executing program 5: 10:01:55 executing program 3: 10:01:55 executing program 4: 10:01:55 executing program 1: 10:01:55 executing program 0: 10:01:55 executing program 2: 10:01:55 executing program 5: 10:01:55 executing program 3: 10:01:55 executing program 4: 10:01:55 executing program 2: 10:01:55 executing program 0: 10:01:55 executing program 1: 10:01:55 executing program 5: 10:01:55 executing program 3: 10:01:55 executing program 2: 10:01:55 executing program 4: 10:01:55 executing program 1: 10:01:55 executing program 0: 10:01:55 executing program 3: 10:01:55 executing program 5: 10:01:55 executing program 4: 10:01:55 executing program 2: 10:01:55 executing program 1: 10:01:55 executing program 0: 10:01:55 executing program 3: 10:01:55 executing program 5: 10:01:55 executing program 2: 10:01:55 executing program 4: 10:01:55 executing program 0: 10:01:55 executing program 1: 10:01:55 executing program 3: 10:01:55 executing program 4: 10:01:55 executing program 2: 10:01:55 executing program 5: 10:01:55 executing program 0: 10:01:56 executing program 1: 10:01:56 executing program 3: 10:01:56 executing program 5: 10:01:56 executing program 4: 10:01:56 executing program 1: 10:01:56 executing program 0: 10:01:56 executing program 3: 10:01:56 executing program 2: 10:01:56 executing program 4: 10:01:56 executing program 5: 10:01:56 executing program 3: 10:01:56 executing program 1: 10:01:56 executing program 0: 10:01:56 executing program 4: 10:01:56 executing program 5: 10:01:56 executing program 2: 10:01:56 executing program 1: 10:01:56 executing program 4: 10:01:56 executing program 3: 10:01:56 executing program 2: 10:01:56 executing program 0: 10:01:56 executing program 5: 10:01:56 executing program 1: 10:01:56 executing program 4: 10:01:56 executing program 3: 10:01:56 executing program 0: 10:01:56 executing program 5: 10:01:56 executing program 2: 10:01:56 executing program 3: 10:01:56 executing program 1: 10:01:56 executing program 0: 10:01:56 executing program 4: 10:01:56 executing program 2: 10:01:56 executing program 5: 10:01:56 executing program 3: 10:01:56 executing program 1: 10:01:56 executing program 4: 10:01:57 executing program 2: 10:01:57 executing program 0: 10:01:57 executing program 3: 10:01:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x5, 0x7, 0x9}, 0x2c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x3, 0x6) fstat(0xffffffffffffffff, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)) msgctl$IPC_RMID(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x21) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 10:01:57 executing program 5: 10:01:57 executing program 4: 10:01:57 executing program 2: 10:01:57 executing program 0: 10:01:57 executing program 3: 10:01:57 executing program 5: 10:01:57 executing program 3: 10:01:57 executing program 4: 10:01:57 executing program 5: 10:01:57 executing program 2: 10:01:57 executing program 0: 10:01:57 executing program 1: 10:01:57 executing program 5: 10:01:57 executing program 4: 10:01:57 executing program 3: 10:01:57 executing program 2: 10:01:57 executing program 0: 10:01:57 executing program 1: 10:01:57 executing program 5: 10:01:57 executing program 4: 10:01:57 executing program 3: 10:01:57 executing program 0: 10:01:57 executing program 2: 10:01:57 executing program 1: 10:01:57 executing program 4: 10:01:57 executing program 5: 10:01:57 executing program 3: 10:01:57 executing program 5: 10:01:57 executing program 0: 10:01:57 executing program 2: 10:01:57 executing program 4: 10:01:57 executing program 1: 10:01:57 executing program 3: 10:01:58 executing program 0: 10:01:58 executing program 4: 10:01:58 executing program 2: 10:01:58 executing program 5: 10:01:58 executing program 3: 10:01:58 executing program 1: 10:01:58 executing program 4: 10:01:58 executing program 2: 10:01:58 executing program 0: 10:01:58 executing program 3: 10:01:58 executing program 1: 10:01:58 executing program 5: 10:01:58 executing program 3: 10:01:58 executing program 4: 10:01:58 executing program 0: 10:01:58 executing program 2: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) sendfile(r0, r0, &(0x7f0000001000)=0x1400, 0xfec) 10:01:58 executing program 1: 10:01:58 executing program 5: 10:01:58 executing program 0: 10:01:58 executing program 3: 10:01:58 executing program 4: 10:01:58 executing program 2: 10:01:58 executing program 5: 10:01:58 executing program 1: 10:01:58 executing program 3: 10:01:58 executing program 0: 10:01:58 executing program 4: 10:01:58 executing program 2: 10:01:58 executing program 5: 10:01:58 executing program 3: 10:01:58 executing program 1: 10:01:58 executing program 5: 10:01:58 executing program 0: 10:01:58 executing program 2: 10:01:58 executing program 4: 10:01:58 executing program 3: 10:01:58 executing program 0: 10:01:58 executing program 5: 10:01:58 executing program 1: 10:01:59 executing program 3: 10:01:59 executing program 2: 10:01:59 executing program 4: 10:01:59 executing program 5: 10:01:59 executing program 1: 10:01:59 executing program 0: 10:01:59 executing program 3: 10:01:59 executing program 4: 10:01:59 executing program 2: 10:01:59 executing program 0: 10:01:59 executing program 5: 10:01:59 executing program 1: 10:01:59 executing program 3: 10:01:59 executing program 0: 10:01:59 executing program 2: 10:01:59 executing program 5: 10:01:59 executing program 4: 10:01:59 executing program 1: 10:01:59 executing program 5: 10:01:59 executing program 0: 10:01:59 executing program 3: 10:01:59 executing program 2: 10:01:59 executing program 4: 10:01:59 executing program 1: 10:01:59 executing program 5: 10:01:59 executing program 2: 10:01:59 executing program 4: 10:01:59 executing program 0: 10:01:59 executing program 3: 10:01:59 executing program 5: 10:01:59 executing program 1: 10:01:59 executing program 4: 10:01:59 executing program 2: 10:01:59 executing program 3: 10:01:59 executing program 0: 10:01:59 executing program 5: 10:01:59 executing program 1: 10:01:59 executing program 2: 10:02:00 executing program 3: 10:02:00 executing program 4: 10:02:00 executing program 0: 10:02:00 executing program 2: 10:02:00 executing program 5: 10:02:00 executing program 1: 10:02:00 executing program 4: 10:02:00 executing program 3: 10:02:00 executing program 0: 10:02:00 executing program 1: 10:02:00 executing program 4: 10:02:00 executing program 3: 10:02:00 executing program 5: 10:02:00 executing program 1: 10:02:00 executing program 2: 10:02:00 executing program 0: 10:02:00 executing program 4: 10:02:00 executing program 5: 10:02:00 executing program 3: 10:02:00 executing program 2: 10:02:00 executing program 1: 10:02:00 executing program 0: 10:02:00 executing program 3: 10:02:00 executing program 4: 10:02:00 executing program 5: 10:02:00 executing program 3: 10:02:00 executing program 1: 10:02:00 executing program 0: 10:02:00 executing program 2: 10:02:00 executing program 5: 10:02:00 executing program 4: 10:02:00 executing program 3: 10:02:00 executing program 1: 10:02:00 executing program 0: 10:02:00 executing program 5: 10:02:00 executing program 4: 10:02:00 executing program 2: 10:02:01 executing program 3: 10:02:01 executing program 1: 10:02:01 executing program 4: 10:02:01 executing program 0: 10:02:01 executing program 2: 10:02:01 executing program 5: 10:02:01 executing program 4: 10:02:01 executing program 2: 10:02:01 executing program 3: 10:02:01 executing program 1: 10:02:01 executing program 0: 10:02:01 executing program 2: 10:02:01 executing program 4: 10:02:01 executing program 5: 10:02:01 executing program 1: 10:02:01 executing program 3: 10:02:01 executing program 2: 10:02:01 executing program 4: 10:02:01 executing program 0: 10:02:01 executing program 3: 10:02:01 executing program 5: 10:02:01 executing program 2: 10:02:01 executing program 4: 10:02:01 executing program 1: 10:02:01 executing program 3: 10:02:01 executing program 0: 10:02:01 executing program 2: 10:02:01 executing program 5: 10:02:01 executing program 1: 10:02:01 executing program 3: 10:02:01 executing program 4: 10:02:01 executing program 5: 10:02:01 executing program 2: 10:02:01 executing program 0: 10:02:01 executing program 1: 10:02:01 executing program 3: 10:02:01 executing program 4: 10:02:02 executing program 0: 10:02:02 executing program 2: 10:02:02 executing program 5: 10:02:02 executing program 1: 10:02:02 executing program 4: 10:02:02 executing program 3: 10:02:02 executing program 2: 10:02:02 executing program 1: 10:02:02 executing program 5: 10:02:02 executing program 0: 10:02:02 executing program 2: 10:02:02 executing program 4: 10:02:02 executing program 3: 10:02:02 executing program 1: 10:02:02 executing program 5: 10:02:02 executing program 0: 10:02:02 executing program 2: 10:02:02 executing program 3: 10:02:02 executing program 1: 10:02:02 executing program 4: 10:02:02 executing program 2: 10:02:02 executing program 1: 10:02:02 executing program 3: 10:02:02 executing program 5: 10:02:02 executing program 0: 10:02:02 executing program 2: 10:02:02 executing program 4: 10:02:02 executing program 1: 10:02:02 executing program 3: 10:02:02 executing program 4: 10:02:02 executing program 2: 10:02:02 executing program 5: 10:02:02 executing program 0: 10:02:02 executing program 1: 10:02:02 executing program 3: 10:02:02 executing program 4: 10:02:02 executing program 5: 10:02:02 executing program 1: 10:02:03 executing program 0: 10:02:03 executing program 2: 10:02:03 executing program 3: 10:02:03 executing program 4: 10:02:03 executing program 2: 10:02:03 executing program 3: 10:02:03 executing program 5: 10:02:03 executing program 1: 10:02:03 executing program 4: 10:02:03 executing program 0: 10:02:03 executing program 3: 10:02:03 executing program 5: 10:02:03 executing program 1: 10:02:03 executing program 4: 10:02:03 executing program 2: 10:02:03 executing program 3: 10:02:03 executing program 0: 10:02:03 executing program 1: 10:02:03 executing program 5: 10:02:03 executing program 2: 10:02:03 executing program 4: 10:02:03 executing program 3: 10:02:03 executing program 1: 10:02:03 executing program 2: 10:02:03 executing program 5: 10:02:03 executing program 0: 10:02:03 executing program 4: 10:02:03 executing program 1: 10:02:03 executing program 3: 10:02:03 executing program 2: 10:02:03 executing program 0: 10:02:03 executing program 5: 10:02:03 executing program 4: 10:02:03 executing program 1: 10:02:03 executing program 2: 10:02:03 executing program 3: 10:02:03 executing program 0: 10:02:04 executing program 5: 10:02:04 executing program 3: 10:02:04 executing program 1: 10:02:04 executing program 2: 10:02:04 executing program 4: 10:02:04 executing program 0: 10:02:04 executing program 3: 10:02:04 executing program 5: 10:02:04 executing program 1: 10:02:04 executing program 2: 10:02:04 executing program 0: 10:02:04 executing program 4: 10:02:04 executing program 3: 10:02:04 executing program 5: 10:02:04 executing program 1: 10:02:04 executing program 2: 10:02:04 executing program 0: 10:02:04 executing program 4: 10:02:04 executing program 5: 10:02:04 executing program 2: 10:02:04 executing program 0: 10:02:04 executing program 3: 10:02:04 executing program 1: 10:02:04 executing program 4: 10:02:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$uid(0x0, 0x0, 0x4) 10:02:04 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000340)='ecryptfs\x00', 0x1000880, &(0x7f0000000500)='mem\x00\x00\x00\x00\x00\x00\a\x13') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 10:02:04 executing program 5: ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r0) sendmsg$netlink(r3, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1}, 0x0) recvmmsg(r1, &(0x7f00000038c0), 0x3ffffff0000008a, 0x62, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:02:04 executing program 1 (fault-call:4 fault-nth:0): r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 261.354791] ecryptfs_parse_options: eCryptfs: unrecognized option [mem] [ 261.393427] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:02:04 executing program 4: r0 = syz_open_dev$swradio(&(0x7f00000004c0)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000500)=[@in6={0xa, 0x4e22, 0x298, @dev={0xfe, 0x80, [], 0xf}, 0x6b2e379b}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e21, 0xfe000000, @mcast2, 0x800}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e22, 0x3, @loopback, 0x3}, @in6={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}, 0x2}], 0xb0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000003feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000012d6405000000000035040400010000000704000001000000b7050000000000006a0a08fe000000008500000009000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 10:02:04 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:04 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000080), 0x169, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r6, &(0x7f0000000b00), 0x6, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01005764", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000000)={r9}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f00000000c0)={r9, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000080)={r9, 0x0, 0x1, 0x1, 0x3, 0x28d8}, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000040)={r9, 0x401}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={r10, 0x1, 0x7f, 0x1, 0x2, 0x4}, &(0x7f0000000200)=0x14) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r11, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r11, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffed7) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) 10:02:04 executing program 5: 10:02:04 executing program 0: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@loopback, 0x3}, {}, {0x0, 0x0, 0x40}, 0x0, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x2b}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x4, r2, &(0x7f0000000040)='asymmetric\x00', 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r2, 0x0, &(0x7f0000000200)='!-*proc+\x00', &(0x7f0000000240)) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000280)={r2, 0xea, 0x32}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d706b637331206861737a473cfaf20aabdd27e7683d7368613531322d73739d6433000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000006e16f619bf962d9e4321cf00eedaaf5a41ea4c19c8156ab772ecfa897e6e60ed1604beebc1975b5c2b09969b42ece5ac4960bfbec6156949e6839019f65a38a3b20f8af0a0f724a714198afb9a869456e17aba6da26893be9129e51c3138a837f77f9c12af7bfe3484f1b1bd23"], &(0x7f0000000480)="feaa4787d2d627a723d85a4552d63cc26eb6b995b2cba95bb8ce1a5a94e8ea92ae2620c2806c07fc09923aca521da84bc53b1844c8bf1b58f1105fcca01acb6dce48116fec094f8b60c026fec750db1cf4cfdec0648f4b75af6691732f63ed2bef42051faa9c8a521fd93056f455ec65812e91b26ca6fa3f11f9cd19372ce8438c66df2c54dae540fa145b1e7920f3e7eba9f39d3ac1d62d2ad0ba38de858534924abb7483e17eed208137859b1442d9d31605d5ac75c8ab7b499900caafa971f28995511b9ec503b08b738157b269e110f4022202fef1b37a4835332231955b1e413c1d94a021f8e625", &(0x7f00000002c0)=""/50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000680)={0xe7, 0x778a, 0x6}, 0x8) ioctl$VIDIOC_DBG_S_REGISTER(r4, 0x4038564f, &(0x7f00000001c0)={{0x3, @name="0c2d21ce0957bc43df8e0f62b7a066bde834b16b923aed92fdf2063e1cc5ccc6"}, 0x8, 0x47, 0x6f50}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000000c0)={0x760, 0x0, 0x4}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000400)={0x8001002, 0x8, 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000440)=0x7fff) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r8, 0xc008551a, &(0x7f0000000580)={0xc000000, 0x18, [0x81, 0x7f, 0x84b, 0x9, 0x4, 0x8]}) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x9, 0x7, 0x9, 0xf4, 0x0, 0xc1, 0x20, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x8, @perf_config_ext={0x1, 0x8}, 0x6002, 0x200, 0x0, 0x8, 0x6, 0x9, 0x91a0}, r0, 0x0, r1, 0x7) [ 261.458976] Error parsing options; rc = [-22] [ 261.476591] ecryptfs_parse_options: eCryptfs: unrecognized option [mem] [ 261.483566] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 10:02:05 executing program 4: 10:02:05 executing program 5: [ 261.576877] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing [ 261.611177] Error parsing options; rc = [-22] 10:02:05 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x104, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:05 executing program 4: 10:02:05 executing program 3: 10:02:05 executing program 5: 10:02:05 executing program 0: 10:02:05 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x2, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:05 executing program 3: 10:02:05 executing program 2: 10:02:05 executing program 3: 10:02:05 executing program 4: 10:02:05 executing program 0: 10:02:05 executing program 5: 10:02:05 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x3, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:05 executing program 3: 10:02:05 executing program 0: 10:02:05 executing program 5: 10:02:05 executing program 4: 10:02:05 executing program 2: 10:02:05 executing program 5: 10:02:05 executing program 3: 10:02:05 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x7, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:05 executing program 0: 10:02:05 executing program 2: 10:02:06 executing program 4: 10:02:06 executing program 5: 10:02:06 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xffffffffffffff04) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x8100, 0x0) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000280)={0x4, 0x0, [{0x100001, 0xb, &(0x7f0000000100)=""/11}, {0x1f000, 0x18, &(0x7f0000000140)=""/24}, {0xf000, 0x92, &(0x7f0000000180)=""/146}, {0x6000, 0xb, &(0x7f0000000240)=""/11}]}) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000000)=0x1c6d2a96) 10:02:06 executing program 0: 10:02:06 executing program 3: 10:02:06 executing program 2: 10:02:06 executing program 5: 10:02:06 executing program 4: 10:02:06 executing program 3: 10:02:06 executing program 0: 10:02:06 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:06 executing program 2: 10:02:06 executing program 4: 10:02:06 executing program 3: 10:02:06 executing program 5: 10:02:06 executing program 0: 10:02:06 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_REGS(r4, 0x8090ae81, &(0x7f0000000080)) 10:02:06 executing program 4: 10:02:06 executing program 3: 10:02:06 executing program 0: 10:02:06 executing program 2: 10:02:06 executing program 5: 10:02:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f00000000c0)=""/106) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$inet6_sctp(0xa, 0xf, 0x84) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000000)=0x3f, 0x10054) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, &(0x7f0000000080)=0xffffffffffffff63) 10:02:06 executing program 3: 10:02:06 executing program 0: 10:02:06 executing program 4: 10:02:06 executing program 2: 10:02:06 executing program 5: 10:02:06 executing program 0: 10:02:06 executing program 4: 10:02:06 executing program 3: 10:02:06 executing program 5: 10:02:06 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, 0x0, &(0x7f0000000000)) 10:02:06 executing program 2: 10:02:06 executing program 0: 10:02:06 executing program 3: 10:02:06 executing program 4: 10:02:07 executing program 2: 10:02:07 executing program 5: 10:02:07 executing program 0: 10:02:07 executing program 4: 10:02:07 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x180000) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:07 executing program 2: 10:02:07 executing program 3: 10:02:07 executing program 5: 10:02:07 executing program 4: 10:02:07 executing program 0: 10:02:07 executing program 3: 10:02:07 executing program 5: 10:02:07 executing program 2: 10:02:07 executing program 4: 10:02:07 executing program 0: 10:02:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x8002) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) getcwd(&(0x7f0000000080)=""/115, 0x73) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r6, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @reserved="a3a28e78a0bef8382d6b6d4db209c96c3666eec0f691c47563c4a5b9b6de18eb"}}) 10:02:07 executing program 3: 10:02:07 executing program 2: 10:02:07 executing program 0: 10:02:07 executing program 5: 10:02:07 executing program 4: 10:02:07 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$TIOCEXCL(r1, 0x540c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:07 executing program 3: 10:02:07 executing program 2: 10:02:07 executing program 5: 10:02:07 executing program 0: 10:02:07 executing program 4: 10:02:07 executing program 3: 10:02:07 executing program 2: 10:02:07 executing program 3: 10:02:07 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000000)={0x29, 0x6, 0x0, {0x6, 0x4}}, 0x29) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001080)={r7, &(0x7f0000000080)="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"}, 0x20) 10:02:07 executing program 0: 10:02:07 executing program 5: 10:02:07 executing program 4: 10:02:07 executing program 3: 10:02:07 executing program 0: 10:02:08 executing program 2: 10:02:08 executing program 4: 10:02:08 executing program 5: 10:02:08 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:08 executing program 3: 10:02:08 executing program 4: 10:02:08 executing program 5: 10:02:08 executing program 2: 10:02:08 executing program 0: 10:02:08 executing program 3: 10:02:08 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x40000) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_CPUID2(r4, 0xc008ae91, &(0x7f0000000080)={0x3, 0x0, [{}, {}, {}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_SET_XSAVE(r6, 0x5000aea5, &(0x7f0000000100)={"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"}) 10:02:08 executing program 4: 10:02:08 executing program 5: 10:02:08 executing program 3: 10:02:08 executing program 2: 10:02:08 executing program 0: 10:02:08 executing program 4: 10:02:08 executing program 5: 10:02:08 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000000)=0xc3d8, 0x4) 10:02:08 executing program 2: 10:02:08 executing program 3: 10:02:08 executing program 4: 10:02:08 executing program 5: 10:02:08 executing program 0: 10:02:08 executing program 2: 10:02:08 executing program 3: 10:02:08 executing program 5: 10:02:08 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000080)={0x0, 0x8, 0x5, &(0x7f0000000000)=0xc}) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:08 executing program 4: 10:02:08 executing program 0: 10:02:08 executing program 2: 10:02:08 executing program 3: 10:02:08 executing program 5: 10:02:08 executing program 4: 10:02:08 executing program 5: 10:02:09 executing program 0: 10:02:09 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'ip6_vti0\x00', 0xe00}) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) setuid(r7) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:09 executing program 3: 10:02:09 executing program 2: 10:02:09 executing program 4: 10:02:09 executing program 5: 10:02:09 executing program 0: 10:02:09 executing program 3: 10:02:09 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_CREATE_DEVICE(r7, 0xc00caee0, &(0x7f0000000140)={0x4}) r8 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socket$packet(0x11, 0x3, 0x300) 10:02:09 executing program 5: 10:02:09 executing program 2: 10:02:09 executing program 4: 10:02:09 executing program 0: 10:02:09 executing program 3: 10:02:09 executing program 5: 10:02:09 executing program 4: 10:02:09 executing program 3: 10:02:09 executing program 2: 10:02:09 executing program 0: 10:02:09 executing program 5: 10:02:09 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001600)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000001640)={0x2, 0x3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = accept(r4, &(0x7f0000001340)=@in={0x2, 0x0, @empty}, &(0x7f00000013c0)=0x80) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001440)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r5, &(0x7f00000015c0)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x120002}, 0xc, &(0x7f0000001580)={&(0x7f0000001480)={0xdc, r6, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1e}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc, 0x1e4d14c8e257b0fb}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffff}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="4b1e05f35eb170393c05c79549bacd9f"}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x20040000}, 0x4) r7 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) writev(r7, &(0x7f0000001300)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="042d1112194f5cb02316b7705fa7312dda4a93d5e798568f7a59fe2e37242836efec800422a934b886fe891edd6a0bd55be15a3e5e6af6de624ec4df1776a7fb6a8745e750442ba6db7d3247f70212f0147f8f59a5bc14fc5426b15b4924ba1d3165d1e0434ce2b74a972e475bb8b5207106b7a1dc93f1d0a75a1688bff16e768334068392af74170fc06295fa66fe3a1a809ce3aeddd4a21bb94025b8690977613cea", 0xa3}, {&(0x7f0000001140)="313fc6a84d7fa5a93e40e47369b75a7ad4004806365bc2cf6bb3c91452270208363482818ef0cbc3ca2491271433224b58f7a901d1eba6d9d16b0f00890e92e161ca4aeb118ff28fe468c43736209861583f2fca4a23f5ea3fbc7b8ea861d1402d117b98f9a3f57f0307e50707edcb531783c59b994855a3091fa0396e14c99b03da61206f05e832c032015428628fbffa158a6a6aa9a8b10b80097f73f62b8318", 0xa1}, {&(0x7f0000001200)="efaf42a14b70f343d6aeff8dbbfffa6b70a38fdb469cbde953cd95e7c78b181f4b19361bb1d93bcf78dc44f317a4eb1034011a52dd6da051f62191c4a1d9c87741b0bcef17901049ff606975e7041aa9965b882451eb6c044ff65526c4c06757a0093ce9f0f5be54b92aec8aa7d655c077f97a7c7babd55cee78dc14b6e5849d1102c336c0c13c9915c39a9086ae01336c81029337793d5d61f086cfc04ccd828f098c3a269eafe20e1daa10fae3e79546c7deb84b7ab302292e5bd3f86d2830999f1065bcc210dd123520e287f86e7989ba882a1f75d2a5d46db81bd0ec56d8c5e8746f7c98ce6e3c007d48f597e0", 0xef}], 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x204001fc) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:09 executing program 3: 10:02:09 executing program 2: 10:02:09 executing program 4: 10:02:09 executing program 5: 10:02:09 executing program 0: 10:02:09 executing program 3: 10:02:09 executing program 4: 10:02:09 executing program 2: 10:02:09 executing program 0: 10:02:09 executing program 3: 10:02:09 executing program 5: 10:02:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCSMAXCID(r1, 0x40047451, &(0x7f0000000000)=0x6) getsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:09 executing program 4: 10:02:09 executing program 2: 10:02:09 executing program 0: 10:02:10 executing program 3: 10:02:10 executing program 4: 10:02:10 executing program 2: 10:02:10 executing program 5: 10:02:10 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000080)={0x2, {{0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$nfc_llcp(r6, &(0x7f0000000240)={0x27, 0x1, 0x0, 0x0, 0x0, 0x8, "e5492f7d333eee7a489f74ddfa5e71abe2f026f663f87dd4fb295b9bb496cd31db3289ed9c63de4c591ba4e8a5c0e909f2f8e43896436c2e70e85686f94c87", 0x19}, 0x60) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) readlinkat(r8, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/144, 0x90) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:10 executing program 3: 10:02:10 executing program 2: 10:02:10 executing program 0: 10:02:10 executing program 4: 10:02:10 executing program 5: 10:02:10 executing program 2: 10:02:10 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x8) r4 = fcntl$dupfd(r1, 0x0, r1) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x300c7d5ffb44a2ee, 0x0) ioctl$PPPIOCGUNIT(r5, 0x80047456, &(0x7f0000000100)) 10:02:10 executing program 4: 10:02:10 executing program 0: 10:02:10 executing program 3: 10:02:10 executing program 5: 10:02:10 executing program 2: 10:02:10 executing program 0: 10:02:10 executing program 3: 10:02:10 executing program 5: 10:02:10 executing program 4: 10:02:10 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$netrom(r3, &(0x7f00000000c0)={{0x3, @default, 0x3}, [@bcast, @null, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf, 0x1f, 0x1}, 0xf) r6 = fcntl$dupfd(r0, 0x406, r1) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000001c0)={0x80000, 0x1ff, 0x7, 'queue0\x00', 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$nfc_llcp(r8, 0x118, 0x1, &(0x7f0000000140)=""/113, 0x71) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:10 executing program 5: 10:02:10 executing program 0: 10:02:10 executing program 2: 10:02:10 executing program 4: 10:02:10 executing program 3: 10:02:10 executing program 5: 10:02:10 executing program 4: 10:02:10 executing program 3: 10:02:11 executing program 0: 10:02:11 executing program 5: 10:02:11 executing program 2: 10:02:11 executing program 4: 10:02:11 executing program 0: 10:02:11 executing program 3: 10:02:11 executing program 2: 10:02:11 executing program 5: 10:02:11 executing program 4: 10:02:11 executing program 3: 10:02:11 executing program 0: 10:02:11 executing program 2: 10:02:11 executing program 5: 10:02:11 executing program 3: 10:02:11 executing program 0: 10:02:11 executing program 4: 10:02:11 executing program 2: 10:02:11 executing program 5: 10:02:11 executing program 3: 10:02:11 executing program 2: 10:02:11 executing program 0: 10:02:11 executing program 5: 10:02:11 executing program 4: 10:02:11 executing program 2: 10:02:11 executing program 3: 10:02:11 executing program 0: 10:02:11 executing program 4: 10:02:11 executing program 5: 10:02:11 executing program 2: 10:02:11 executing program 3: 10:02:11 executing program 0: 10:02:11 executing program 4: 10:02:11 executing program 5: 10:02:11 executing program 3: 10:02:12 executing program 2: 10:02:12 executing program 0: 10:02:12 executing program 5: 10:02:12 executing program 4: 10:02:12 executing program 3: 10:02:12 executing program 0: 10:02:12 executing program 2: 10:02:12 executing program 5: 10:02:12 executing program 4: 10:02:12 executing program 2: 10:02:12 executing program 3: 10:02:12 executing program 0: 10:02:12 executing program 5: 10:02:12 executing program 4: 10:02:12 executing program 0: 10:02:12 executing program 5: 10:02:12 executing program 3: 10:02:12 executing program 2: 10:02:12 executing program 4: 10:02:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, 0x0) 10:02:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x80200000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCSRS485(r0, 0x542f, 0x0) 10:02:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 10:02:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffff9c) 10:02:12 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) 10:02:12 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = epoll_create1(0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 10:02:12 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, &(0x7f0000000740)) 10:02:12 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = creat(0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 10:02:12 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x80200000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) 10:02:13 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x100000001, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x3c011354e76de4a7) writev(r0, 0x0, 0x0) 10:02:13 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = epoll_create1(0x0) fcntl$addseals(r0, 0x409, 0x0) 10:02:13 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x80200000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, 0x0) 10:02:13 executing program 3: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffff6fe) prctl$PR_SET_ENDIAN(0x1e, 0x0) 10:02:13 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$TIOCMBIS(r1, 0x5416, 0x0) 10:02:13 executing program 2: r0 = memfd_create(&(0x7f0000000280)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f.\x80\x98\xb4\xf98RS\xbf$?\x8b\xc5\xc0$\x7f\x06\xfcD\x9a\xda\x8b\x91\x9a\x8e \xfc\x05\xfe9;q\x14T+G~;\x81\xe5*\xfdw\xac\a\x85\xbdb\xb8\xa5%tN\x10\t\xb1PQ\xb9\xbd\x88;\x93\xf1\xdd\xc6\xf0\xa3\xffr|!\xa6\v\xe3Q\xae\xe8\x19\xc5\r\x99\x8e\xd4:\x02%N\xc4W\x16.iz?Xq\x0e\xb6\xf1\xc6\xaf\xc2\x7f\xf4S\xd4A\xd7\x0f\xb4H\x85\xb5\xc4\xd7\x7f\xde\x8c\xe4\t\x9aW=\xfd\rm_\xb2\xf1\x95\xb8\x16\x1f\x17l\xc9e\x834,\xb9\x15\xdb\x0e7\xa2\xdf\xbb\xc4\t\xb5\xe5\xccD\xa8\xdc\xb4p\x020xffffffffffffffff}) syz_emit_ethernet(0x9e, &(0x7f0000000280)={@link_local={0x1, 0x80, 0xc2, 0x608}, @local, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x68, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x2, 0x543, 0xff7f, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x28, 0x8dfffffffffffff5, 0x0, 0xfe03, 0x0, 0x0, 0xffffca88], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff87, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3805, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3801, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0xff, 0x5}, [@hopopts={0x0, 0x1, [], [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @routing={0x0, 0x4, 0x0, 0x0, 0x0, [@empty, @rand_addr="90b6b154fce8be6a513d8f833ea49b03"]}]}}}}}}}, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000140)=0x3, 0x4) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(r4, 0x0, r2) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x280c2, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000180), 0x0, 0x7, 0x4, 0x0, 0x3, 0x1000, {0x6, 0x81, 0x1, 0x20, 0x40c, 0x400, 0x7, 0x1, 0x0, 0x1, 0x6, 0x100, 0x1, 0x8, "be12b0bfd083f273199f47866964bcabaaf8eecf97d0870de5886beb7451f62c"}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r8, 0xc0206434, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffff}) ioctl$DRM_IOCTL_SG_ALLOC(r6, 0xc0106438, &(0x7f0000000100)={0x1000, r9}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:17 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000002780)=[{{0x0, 0x363, &(0x7f0000000200)=[{&(0x7f0000000140), 0x304}], 0x8}, 0x2}], 0x13, 0x0) 10:02:17 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3ffffff]}}, r1}}, 0x48) bind$inet(0xffffffffffffffff, 0x0, 0x0) [ 273.609260] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max [ 273.632332] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 10:02:17 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:17 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = fcntl$dupfd(r3, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xbf, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000040)={[{}, {0x70f000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000003}]}) 10:02:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x1, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) 10:02:17 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@acquire={0x16c, 0x17, 0x229, 0x0, 0x0, {{@in=@multicast1}, @in6=@ipv4={[], [], @dev}, {@in=@loopback, @in6=@local}, {{@in6=@rand_addr="9ac583ffab16f1e444230d2f25d8fb0d", @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}}}, [@tmpl={0x44, 0x5, [{{@in6=@remote, 0x0, 0x6c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x1}]}]}, 0x16c}}, 0x0) 10:02:17 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 10:02:17 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 10:02:17 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x202000, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000100)={0x10001, 0x6, 0x2, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) getsockname$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r5, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe16c1) 10:02:17 executing program 2: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4000, 0x100) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x74) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000180)=0x400100000001, 0xd48f1f8357fa1f19) r3 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x92a, 0x80002) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x8007ff, @rand_addr="2ef60ce9836debbbd734288b36ba03c2", 0x2}, 0x1c) r4 = dup2(r2, r2) write$P9_RREADDIR(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="490000002902000800000049000000000000002e0000000039ed69a8d0aacba215216ef77a28a1a01eb1cc725be177100007002e2f66696c653000000000000000000039000000001600000000e2c5935148019e93e13df753d0be87a80e2911a90000ff03000000000000000000b8a5eaa0176e8d61bcbb9377f73b6cfa1fc46855a4173e64f58ffe08cc7364fe0100dee71e4e26a65cb804f2d2d54197f9a1e309f00a91f0d4940811fffe6b58991f76cd58c8fa40aa84e48ed55ff6f0ef801e01ce1d9977aa48da01cd557bd740deb3e6a56901a4516de79732b0f9f996827c4c5e8fa5e2cb8a963954136abd573a39eac10ed557e14f912048d8edab02e94d252fde01f2c7f2df3f1dfac36e7fc71d42b76a90ff4710985e0c40b1b64ba098452c010f64b1c72c9224237c2acb91af22131749230c2e57f2b22456fc968fcf7737f6aa27db7e685ed812885e4e2b8280d5232f4c9fb0742df316529d30b5db94f55c0ad0d203f040056cdba1385ed4f50d"], 0x49) r5 = socket(0x40000000015, 0x5, 0x0) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f00000008c0)=[@sack_perm, @window={0x3, 0x1ff, 0x436a}, @timestamp, @timestamp, @window={0x3, 0x6, 0x3}, @window={0x3, 0x40, 0xfaf6}], 0x1262dc2fc18a2a05) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$UHID_GET_REPORT_REPLY(r4, &(0x7f0000000100)={0xa, 0x7, 0x1, 0x3}, 0xa) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000040), 0x4) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f00000001c0)=0x5, 0x4) r6 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r6, 0x108200) r7 = open(&(0x7f0000000000)='./bus\x00', 0x4000, 0x48) sendfile(r6, r7, 0x0, 0x8000fffffffe) r8 = socket$nl_route(0x10, 0x3, 0x0) socket(0x11, 0x800000003, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000280)={0x0, 0xfffffffffffffd09, &(0x7f0000000080)={&(0x7f00000000c0)=@newqdisc={0x40, 0x24, 0xf01, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x4}}]}, 0x40}}, 0x0) [ 274.441866] audit: type=1400 audit(1570356137.859:68): avc: denied { ioctl } for pid=11343 comm="syz-executor.5" path="socket:[42448]" dev="sockfs" ino=42448 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 274.480669] bond0: Releasing backup interface bond_slave_1 10:02:17 executing program 4: [ 274.530222] bond0: Enslaving bond_slave_1 as an active interface with an up link 10:02:18 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) [ 274.572047] bond0: Releasing backup interface bond_slave_1 10:02:18 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000100)=""/27) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xd5f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$session_to_parent(0x12) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, &(0x7f0000000080)=0x40) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x11) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 274.663539] bond0: Enslaving bond_slave_1 as an active interface with an up link 10:02:18 executing program 4: 10:02:18 executing program 5: 10:02:18 executing program 0: 10:02:18 executing program 2: 10:02:18 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) r6 = fcntl$dupfd(r1, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:18 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:18 executing program 4: 10:02:18 executing program 5: 10:02:18 executing program 2: 10:02:18 executing program 4: 10:02:18 executing program 5: 10:02:18 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:18 executing program 0: 10:02:18 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3, 0x90800) ioctl$VIDIOC_S_HW_FREQ_SEEK(r3, 0x40305652, &(0x7f00000000c0)={0x4, 0xe7b21449e49d4150, 0x1, 0x9, 0x7, 0xebe5, 0x5}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_IRQP_READ(r5, 0x8008700b, &(0x7f0000000000)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:18 executing program 4: 10:02:18 executing program 2: 10:02:18 executing program 0: 10:02:18 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:18 executing program 5: 10:02:18 executing program 4: 10:02:18 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKREPORTZONE(r2, 0xc0101282, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x3, 0x10001, 0x9}}, 0x28) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000000)={0x1f, 0x19, 0x0, 0x1}, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$ION_IOC_HEAP_QUERY(r6, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:18 executing program 0: 10:02:19 executing program 2: 10:02:19 executing program 5: 10:02:19 executing program 4: 10:02:19 executing program 2: 10:02:19 executing program 5: 10:02:19 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:19 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) setsockopt(r3, 0x1, 0x2, &(0x7f0000000080)="1a3b3232b40e4377b307e4e0cf6b2af07a85fb96319783fd2cd7afd36dc4b753f06538916c84aeb1016685531d1894bef6b5bd073df24876ea29c760d5afe8aeaf549d0b5dd8c251374ee89c2cff1f3c18faee1149bfc93a78678e248ec63a90e47fcb136c52c3dce7c4818f2a3f13c2e9176bf41cec6c2897fd03683feea7645ae92ec81fb3753d0d5ee98b52a81b21d6a2488eedf5cb836027869c4efe0fe80ce90aafc02ab4ed3041524c72029fd362a9f101c02f5e1a59b3d8800fba5baf885492dc7e3e2774c22e3dec1688c89b4c87524907c25b86253684b9e5fdc473bc83527a90e9ba02653f99889a107b61feafc616c9bc7ad835", 0xf9) 10:02:19 executing program 0: 10:02:19 executing program 4: 10:02:19 executing program 2: 10:02:19 executing program 5: 10:02:19 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:19 executing program 4: 10:02:19 executing program 0: 10:02:19 executing program 2: 10:02:19 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:19 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, 0x0, &(0x7f0000000040)) epoll_create1(0xa4ed411ff3cd6f1a) 10:02:19 executing program 5: 10:02:19 executing program 0: 10:02:19 executing program 2: 10:02:19 executing program 4: 10:02:19 executing program 5: 10:02:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:19 executing program 0: 10:02:19 executing program 2: 10:02:19 executing program 5: 10:02:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r1, &(0x7f0000000180)='v', 0x1) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r1, r1, &(0x7f0000000080), 0x2000000000) 10:02:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:19 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000000)={0x0, 0x1, 0x7f, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000080), 0x169, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r4, &(0x7f0000000b00), 0x6, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000000)={r7}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000000c0)={r7, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000080)={r7, 0x0, 0x1, 0x1, 0x3, 0x28d8}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000080)={r7, @in={{0x2, 0x4e23, @loopback}}, [0x200, 0x9, 0x6, 0x9, 0x9, 0x1, 0x5, 0x0, 0x200, 0x0, 0x9f1, 0x6, 0x5651, 0x10000, 0x6]}, &(0x7f0000000180)=0x100) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) listen(r0, 0x0) 10:02:19 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) ptrace$peekuser(0x3, r0, 0x1) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001640)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005300)='/dev/ptmx\x00', 0x4002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) write$nbd(r1, &(0x7f0000005380)={0x67446698, 0x0, 0x2, 0x1, 0x1, "0f05c5f509773daf441a47a20252dd7b036fe4a0ed86306f1159fc4d85747da6bddccb3049f79ffe4ae03caf1287c979f2a019cf8d4d666e950c94f39bcb282cbac5962e3472df7c965a3741d288c04206c6c0a6a786e80c52fc06f39b54b50dc3604aa3a5379832452666f6e9d24a6fa5388d01af67cfb2470d116b02477dd9c7ee18792e66886b26fc7bf475e632a77a0ed6b6887c56723ebd5ff5309e41f62f2e62ac982b1328fcf69ca7a553d7e94ba3d35beb8446e86e9c4b540fdab27520bd9ae4"}, 0xd4) 10:02:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000001480)=""/140, &(0x7f0000001540)=0x8c) 10:02:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:20 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sysfs$2(0x2, 0x100000000, &(0x7f0000000100)=""/30) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000180)={0xfffe0000, 0xc, 0x4, 0x40400100, {0x77359400}, {0x2, 0x8, 0x1, 0x7, 0x9, 0x8}, 0x2, 0x3, @planes=&(0x7f0000000340)={0xef, 0x6, @fd=r3, 0x7fff}, 0x4}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_TRY_ENCODER_CMD(r4, 0xc028564e, &(0x7f0000000000)={0x1, 0x1, [0x5, 0x3, 0x7fffffff, 0xf0c, 0x8, 0x4, 0xfff, 0x2a]}) r5 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bind$llc(r7, &(0x7f0000000080)={0x1a, 0x324, 0x40, 0xc0, 0x5, 0x0, @local}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) preadv(r12, &(0x7f0000000080), 0x169, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r13, &(0x7f0000000b00), 0x6, 0x0) r14 = socket$inet6_sctp(0xa, 0x1, 0x84) r15 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="ed0000000c29830bd5566670ea26aba824bf04755e8a19c4f2862a804e6591c93b5187700e68dcc339c5b0e8ca3f84a90cc7abc283c989d2119c0e9add93a9dfa256f322fe974eb35e021d3706517f90fb1d4de78c138f12c73a3c0069a9188bb83609f453d15b29d389f78e0c6cc43de3ff8782f48f6148fcf18a66a274431165ff6be22f596805f614fb8b00e0", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r14, 0x84, 0x1, &(0x7f0000000000)={r16}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r13, 0x84, 0x75, &(0x7f00000000c0)={r16, 0x9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r12, 0x84, 0x1, &(0x7f0000000080)={r16, 0x0, 0x1, 0x1, 0x3, 0x28d8}, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r11, 0x84, 0x0, &(0x7f0000000200)={r16, 0x6, 0x2, 0xf6d}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000280)={r17, 0x401, 0xffff, 0x3f, 0x9, 0x8}, &(0x7f00000002c0)=0x14) setsockopt$inet_dccp_buf(r9, 0x21, 0x0, &(0x7f00000000c0)="9ad423933034978cab6dfd75c526", 0xc507edc4) 10:02:20 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x80200000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) [ 276.598754] audit: type=1400 audit(1570356140.029:69): avc: denied { create } for pid=11501 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 10:02:20 executing program 0: mmap(&(0x7f0000977000/0x200000)=nil, 0x7fffdf688000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 10:02:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x7, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) write(r1, &(0x7f0000000180)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdef", 0x4e) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0x7c9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8001}, 0x20) socket$inet(0x2, 0x3, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000180)='bcsf0\x00@\x00\x00\x05\x00\x00\x11\x00\x00\x13') sendfile(r1, r1, &(0x7f0000000080), 0x2000000000) sendfile(r1, r1, &(0x7f0000000240), 0x8000) 10:02:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x0) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) [ 276.722797] audit: type=1400 audit(1570356140.029:70): avc: denied { setopt } for pid=11501 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_iscsi_socket permissive=1 [ 276.832565] audit: type=1400 audit(1570356140.239:71): avc: denied { ioctl } for pid=11523 comm="syz-executor.5" path="socket:[43836]" dev="sockfs" ino=43836 ioctlcmd=0x89a0 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 10:02:20 executing program 4: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 10:02:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0xd, 0x4000000000000800, 0x1}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000003c0)={r0, &(0x7f0000000280)='C', &(0x7f0000000300)=""/158}, 0x20) 10:02:20 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000240)={'filter\x00', 0x0, 0x4, 0x47, [], 0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f0000000100)=""/71}, &(0x7f0000000000)=0x78) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000200)) 10:02:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x80200000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2a, 0x0, &(0x7f0000000240)) 10:02:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x0) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@deltclass={0x24, 0x2a, 0xffffff1f, 0x0, 0x0, {0x0, r3}}, 0x24}}, 0x0) 10:02:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x80200000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x0) bind$inet6(r0, 0x0, 0x0) [ 277.336728] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 10:02:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x7, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) write(r1, &(0x7f0000000180)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdef", 0x4e) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0x7c9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8001}, 0x20) socket$inet(0x2, 0x3, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000180)='bcsf0\x00@\x00\x00\x05\x00\x00\x11\x00\x00\x13') sendfile(r1, r1, &(0x7f0000000080), 0x2000000000) sendfile(r1, r1, &(0x7f0000000240), 0x8000) 10:02:20 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xc8b9, 0x801) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)) 10:02:20 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x0) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:20 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, 0x0) 10:02:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) 10:02:21 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400000, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) socket(0x4, 0x5, 0x6) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:21 executing program 3: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000b40)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000140)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) 10:02:21 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x240000, 0x10) 10:02:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, 0x0) 10:02:21 executing program 3: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:21 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) fstat(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r5) setresgid(r2, r3, r5) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x7, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) write(r1, &(0x7f0000000180)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdef", 0x4e) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)=0x7c9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8001}, 0x20) socket$inet(0x2, 0x3, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000180)='bcsf0\x00@\x00\x00\x05\x00\x00\x11\x00\x00\x13') sendfile(r1, r1, &(0x7f0000000080), 0x2000000000) sendfile(r1, r1, &(0x7f0000000240), 0x8000) 10:02:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 10:02:21 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xd}, 0x80, 0x0}, 0x0) 10:02:21 executing program 3: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0xd9) 10:02:21 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f0000000540)={0x7fff, @remote}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r9 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000300)='.request_key_auth\x00', 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000003e40)=@newqdisc={0x148, 0x24, 0x507, 0x0, 0x0, {0x0, r8, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14}]}}]}, 0x148}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="300000002400070500"/20, @ANYRES32=r8, @ANYBLOB="000000000000ffff0900faad000001006874620004000200"], 0x30}}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000080)="9de736be8bd4cef83415d6a6f24d11fc63a5ffe8ab815a73f699c1a661f97f028fc721b187fdcf32cbe1e45d1d55d27a5030ec81cf5497ddf9177adf40b818ee27c740dcadd67b3f7a26344759ad25f80bf709ed3e31e6903893e8928931ceacf94e0bb5c780b40d5bf839523b151cbf8409ac14b2c46904a99c442d85de6e2b3496c6dd3346e8d1857f7f0d768d00923b90825457e4f5ba8600daef4e7e71d99f61d5804322fff921cbabb2df3cdedcd5fb91196f1f2409b88407607c30e2ff54ae58a24c3790cfbb5a0eb343bca58a4e", 0xd1, 0x20000000, &(0x7f0000000000)={0x11, 0x0, r8, 0x1, 0x2, 0x6, @local}, 0x14) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) r10 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x200, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r10, &(0x7f00000004c0)={&(0x7f0000000380), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="bc000000", @ANYRES16=0x0, @ANYBLOB="100028bd7000fbdbdf2502000000a800050008000100696200000c000200080001001700000008000100756470004400020008000400060000000800040008000000080004000100000008000300a2060000080003000700000008000200070000000800040003000079af1dee37ea61573d4e0008000300060000003ca40200230004000100000008000400000000000800010012000000080001000b00000008000200090000000800030058000000080002000080"], 0xbc}}, 0x4000000) 10:02:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) 10:02:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe52, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1400000022000104000000a6ffffffffffffffe28f139814a2b0bf0b6511932bfa21a9ba54615f6d349dab4f078f12b71406822ddc8af61121be129ca86ecd55927a3d6d4ee9a52d00003ec6cf5f2b916620e885549ca6df674f8e5800f9fe4e3527417b9b0c1412faf4"], 0x14}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000700)=@allocspi={0x158, 0x16, 0x1, 0x0, 0x0, {{{@in=@multicast2, @in=@remote}, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x33}, @in=@dev}, 0x0, 0x10000}, [@mark={0xc, 0x15, {0x0, 0xc9}}, @algo_auth_trunc={0x4c, 0x14, {{'sha384-ssse3\x00'}}}, @tfcpad={0x8, 0x16, 0x1}]}, 0x158}, 0x8}, 0x0) 10:02:21 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, 0x0, 0x0) [ 278.458934] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 278.491580] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 10:02:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, 0x0) write(r1, &(0x7f0000000180), 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000340)=0x7c9) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local, 0x4, 0x1, 0x0, 0x0, 0x8, 0x8001}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000180)='bcsf0\x00@\x00\x00\x05\x00\x00\x11\x00\x00\x13') sendfile(r1, r1, &(0x7f0000000240), 0x8000) 10:02:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) socket$inet(0x2, 0x3, 0x2) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0x3) syz_open_pts(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) select(0x40, &(0x7f0000000280)={0x7f}, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) [ 278.515096] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 278.525763] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:22 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4, 0x10a0622531711341) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000100)=0xd57) fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdirat$cgroup(r4, &(0x7f0000000000)='syz0\x00', 0x1ff) openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0xbde) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 278.602217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 10:02:22 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x80200000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setown(r0, 0x8, 0x0) 10:02:22 executing program 5: 10:02:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, 0x0, 0x0) 10:02:22 executing program 2: 10:02:22 executing program 4: 10:02:22 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x200, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:22 executing program 0: 10:02:22 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = creat(0x0, 0x0) timerfd_gettime(r0, 0x0) 10:02:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r1, &(0x7f0000000300), 0x121, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001b9, 0x0) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000080)=0x80000001, 0x4) 10:02:22 executing program 5: 10:02:22 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$selinux_create(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="733a7572616e64656e742430303030303030303030303030303030330000000000005cf3000000004e000000888eef4c6e6049cecfb1bb8dfe390096ef4859028f1d2658af4c97722341a78d3e2eaaa1ff6fb30000000000000000f658e33715a517fcbc"], 0x4a) 10:02:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, 0x0, 0x0) 10:02:22 executing program 0: 10:02:22 executing program 0: 10:02:22 executing program 5: 10:02:22 executing program 4: 10:02:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100), 0x0) 10:02:22 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) r5 = gettid() ptrace$setopts(0x4206, r5, 0x1000000000000f35, 0x21) tkill(r5, 0x3c) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r5, 0x0, 0x0) process_vm_readv(r5, &(0x7f0000002280)=[{&(0x7f0000000080)=""/148, 0x94}, {&(0x7f0000000140)=""/95, 0x5f}, {&(0x7f0000005380)=""/28, 0x1c}, {&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/168, 0xa8}], 0x6, &(0x7f0000005340), 0x0, 0x0) 10:02:22 executing program 0: [ 279.244288] protocol 88fb is buggy, dev hsr_slave_0 [ 279.249410] protocol 88fb is buggy, dev hsr_slave_1 10:02:22 executing program 5: 10:02:22 executing program 2: 10:02:22 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:22 executing program 5: 10:02:22 executing program 0: 10:02:22 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100), 0x0) 10:02:22 executing program 4: 10:02:22 executing program 4: 10:02:22 executing program 5: 10:02:23 executing program 0: 10:02:23 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000000)) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 10:02:23 executing program 5: 10:02:23 executing program 4: 10:02:23 executing program 2: 10:02:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100), 0x0) 10:02:23 executing program 0: 10:02:23 executing program 4: 10:02:23 executing program 2: 10:02:23 executing program 5: 10:02:23 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x2, 0x300) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$selinux_create(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x4b) 10:02:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x0, 0x60, 0x400000002}], 0xd9) 10:02:23 executing program 0: 10:02:23 executing program 4: 10:02:23 executing program 5: 10:02:23 executing program 2: 10:02:23 executing program 4: 10:02:23 executing program 0: 10:02:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x0, 0x60, 0x400000002}], 0xd9) 10:02:23 executing program 5: 10:02:23 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x800, 0x80081) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x101) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:23 executing program 2: 10:02:23 executing program 4: 10:02:23 executing program 0: 10:02:23 executing program 5: 10:02:23 executing program 4: 10:02:23 executing program 2: 10:02:23 executing program 0: 10:02:23 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000080)=0x213e) r3 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:23 executing program 5: 10:02:23 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x0, 0x60, 0x400000002}], 0xd9) 10:02:23 executing program 5: 10:02:23 executing program 4: 10:02:23 executing program 2: 10:02:23 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x260200, 0x0) setsockopt$ax25_int(r4, 0x101, 0xc, &(0x7f00000000c0)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000000)={0x802b}) r5 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:24 executing program 0: 10:02:24 executing program 4: 10:02:24 executing program 2: 10:02:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x0, 0x400000002}], 0xd9) 10:02:24 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000000)='team_slave_0\x00') ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000080)={0x6c}) 10:02:24 executing program 5: 10:02:24 executing program 0: 10:02:24 executing program 4: 10:02:24 executing program 2: 10:02:24 executing program 5: 10:02:24 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000000)=0x8, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) getsockopt$bt_hci(r3, 0x0, 0x1, &(0x7f0000000080)=""/58, &(0x7f00000000c0)=0x3a) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x0, 0x400000002}], 0xd9) 10:02:24 executing program 2: 10:02:24 executing program 4: 10:02:24 executing program 0: 10:02:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x0, 0x400000002}], 0xd9) 10:02:24 executing program 5: 10:02:24 executing program 2: 10:02:24 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:24 executing program 4: 10:02:24 executing program 0: 10:02:24 executing program 5: 10:02:24 executing program 2: 10:02:24 executing program 0: 10:02:24 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write(r1, &(0x7f0000000240)="ca42f069853cc2e02f0200291b2a505f0b1a9826388bf5c0abb5195a411fdc256cab934abb3cb2a52f3e307c9e4d027b7aeabfca696177fc4f84d0641a4a82fbd5d78b37057b04000000b2b357cc6cead71202cb3ce31d26ce0db0d00c6b7e00ceb14e10cc590e709e98dedc6f455ed16cf2fd51361d0234422ce5429d1b340341a1670e5959db778a640710682fa518d92e6215036ff3e6de8eab119027ba87aba84ba03a379fb805c3a23f21a21bce4b7d887c04538fcf493f46849b5b7f2be619faf96862c2940000000000000000ca371c51fb7195fd4b7c858dade251ad529012abc3c0d25d10ed64cb7b597fda22cb7a5f015c2d6af4e52bada18501daf1c7f428bfe5c148be88f0929d9fd84dd942e4b9e6bc1ad3fa312de00e9a7f844d0e72b62b77bd460f2e70c70c607cffd6", 0x131) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x1, 0x0) 10:02:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60}], 0xd9) 10:02:24 executing program 4: 10:02:24 executing program 5: 10:02:24 executing program 2: 10:02:24 executing program 0: 10:02:24 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20}, 0x801) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:24 executing program 4: 10:02:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60}], 0xd9) 10:02:24 executing program 5: 10:02:24 executing program 0: 10:02:24 executing program 2: 10:02:25 executing program 4: 10:02:25 executing program 5: 10:02:25 executing program 2: 10:02:25 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60}], 0xd9) 10:02:25 executing program 0: 10:02:25 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x84dc0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000080)) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x40) ioctl$TIOCLINUX7(r6, 0x541c, &(0x7f0000000100)={0x7, 0x3f}) 10:02:25 executing program 4: 10:02:25 executing program 2: 10:02:25 executing program 5: 10:02:25 executing program 3: r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r2, 0x0, 0x0) sendmsg$inet6(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0, @ANYRES32=0x0], 0x16}, 0x0) r3 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmsg$inet6(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x002\x00'/24, @ANYRES32=0x0], 0x1c}, 0x0) r4 = socket$inet6(0xa, 0x100800000000002, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') read$FUSE(r5, &(0x7f0000001780), 0x1000) ioctl$GIO_CMAP(r5, 0x4b70, &(0x7f0000000100)) sendmsg$inet6(r4, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) r6 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) r7 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmsg$inet6(r7, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet6(r4, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRESOCT=r6, @ANYRESOCT=r1, @ANYRES64, @ANYBLOB="98a56c1f986f7793072648944e2b70e3df1d345b00c261733855524ad1609510cf2852bb66640b31cc6c75ec838c5b6c204409fd08f6ce97e61b5115b2aaebe360b1e19ad187328a06fa934d441f22cdeacd175378bb65c364230ed95495032cf0e71c19a4df2050d0f54b5c896457f9cca250ccc58bef46b81afb246b45e607f0d1e42153a2eba8d9547ae29ad7b8c120ed3eb6571eecc7a181852d83db09e7fa395c6deeff2cf4c8b109aca16ee9bcbd5d15c3ff120fb4c3ddb0fa7a4bec897bfe54688e07cf254b", @ANYRES32=r0, @ANYRESOCT], 0x11a}, 0x4a4ab06223a0ef46) socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000080)={0x24, r8, 0x403, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x24}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x802004}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r8, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) 10:02:25 executing program 4: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x32) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:02:25 executing program 2: 10:02:25 executing program 0: 10:02:25 executing program 5: 10:02:25 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x80000001}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000000c0)={r6, 0x5, "3abb9cb187"}, &(0x7f0000000100)=0xd) r7 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:25 executing program 0: 10:02:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x800103, 0x0) mount(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000700)='cgroup2\x00\xd2\x06\x00{\x18,\xc9\x9ec\xaf\x11\x04~\xd2\x9d\x7fT).\xf4\xb5\xcc\x00\x1b\xda\xd0\x12\x13@\x88v\xbb\xd7\xc8\xb4\x17N\xf2\xd5\xd1\xd6~\x16\x88\xf6*\xecx\xc1a\x96\xe4\x04\x041\x80\xe5s\xbc\x94d\xee\xf0u\xc7\xe39\xcd\xa2\'\xc6\xe2\x17\v\xb8\xe9\xc6\xf4:f\xb9\xc91\xf1_\x0f\x80\xfd\xcb\x02\xe8!Z\x864\xe1,\x14\xb2\xc2\xdb\xbd\x15\xfe$\x92N\xd9x\t\xbf\xf9\xbd/\x1a\xf0\xc6\xef0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) dup2(r0, r1) [ 282.258749] 9pnet: Insufficient options for proto=fd 10:02:25 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x40) r2 = fcntl$dupfd(r0, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$bt_BT_SECURITY(r6, 0x112, 0x4, &(0x7f00000000c0), 0x2) 10:02:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xffc0000000, 0x22000) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e0000003900052f005a80647e63940d0224fc0010000200000535820900068004001700d1bd00000000b5a8e438", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 10:02:25 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xffcf, &(0x7f0000000100)={&(0x7f0000000000)={0x94, 0x20000000000036, 0x829, 0x0, 0x0, {0x2, 0x1000000, 0x1000000}, [@nested={0xffffffffffffff80, 0x0, [@typed={0x3b, 0x1, @ipv6=@loopback={0x4000000000000}}]}]}, 0x99a1}, 0x1, 0xffffff7f0e000000}, 0x0) 10:02:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f8182235ca6cffdbbea5b7428c4f4", "8be57d14", "a435b8f1d226a342"}, 0x28) dup2(r0, r1) [ 282.414005] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 10:02:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) dup2(r0, r1) [ 282.467942] netlink: zone id is out of range [ 282.472542] netlink: del zone limit has 8 unknown bytes 10:02:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f8182235ca6cffdbbea5b7428c4f4", "8be57d14", "a435b8f1d226a342"}, 0x28) dup3(r0, r1, 0x0) 10:02:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f8182235ca6cffdbbea5b7428c4f4", "8be57d14", "a435b8f1d226a342"}, 0x28) dup2(r0, r1) 10:02:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xffcf, &(0x7f0000000100)={&(0x7f0000000000)={0x94, 0x20000000000036, 0x829, 0x0, 0x0, {0x2, 0x1000000, 0x1000000}, [@nested={0xffffffffffffff80, 0x0, [@typed={0x3b, 0x1, @ipv6=@loopback={0x4000000000000}}]}]}, 0x99a1}, 0x1, 0xffffff7f0e000000}, 0x0) 10:02:26 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x107fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) lseek(r0, 0x0, 0x4) [ 282.679863] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 282.689162] audit: type=1804 audit(1570356146.119:72): pid=11987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir065365919/syzkaller.j9zc4K/262/bus" dev="sda1" ino=16984 res=1 [ 282.720119] netlink: zone id is out of range [ 282.726958] netlink: del zone limit has 8 unknown bytes [ 282.758146] audit: type=1804 audit(1570356146.159:73): pid=11987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir065365919/syzkaller.j9zc4K/262/bus" dev="sda1" ino=16984 res=1 10:02:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') read$FUSE(r0, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) 10:02:26 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) ftruncate(r0, 0x0) [ 282.819841] audit: type=1804 audit(1570356146.229:74): pid=11987 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir065365919/syzkaller.j9zc4K/262/bus" dev="sda1" ino=16984 res=1 10:02:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$inet6_int(r0, 0x29, 0x18, 0x0, &(0x7f0000000140)) 10:02:26 executing program 4: 10:02:26 executing program 0: 10:02:26 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) r8 = getuid() r9 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r11, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) r13 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x4000000000000000, 0x0) fstat(r13, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r14) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="0200000001000a000000000002007838", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="02000200", @ANYRES32=r7, @ANYBLOB="02000000", @ANYRES32=r8, @ANYBLOB="02000800", @ANYRES32=r9, @ANYBLOB="02000400", @ANYRES32=r12, @ANYBLOB="04000f000000000008000400", @ANYRES32=r14, @ANYBLOB="00000600"/16], 0x5c, 0x4) r15 = syz_open_dev$dmmidi(&(0x7f0000000400)='/dev/dmmidi#\x00', 0x2, 0x80) ioctl$KVM_SET_SIGNAL_MASK(r15, 0x4004ae8b, &(0x7f0000000440)={0xf1, "189b3057763701aed7e27f524dc28b6f98be305287ca30dbdc1c798ad3b55349f6a0e2f83a03b2ec58c1fa9822731a5af3c87af92e0a3c53c0c38af00296c6db5a592616543020bc2334ed38cc82fae77417f782c1f2316ea497b19bd00105e0d196f6f4757c7900364189c68e7273885d94b16ebbb2ccb2f7df1dfea4944c432b7a63132cc2febf0009e8dcde61e5d2777510d11122e192f89fb1a568e880a1e80d3844e65ecf12307dacc197305805ae74a1e3c27fd1b13a6991847dba0d6da079efd6efb38bdbe5de31c52454a5d07036d147d63510f1e79e67ef438f2dd31346dcfa0ffa5b638bf6c1aaa14c3723ae"}) r16 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:26 executing program 0: r0 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) ftruncate(r0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) 10:02:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, 0x0) syz_genetlink_get_family_id$tipc(0x0) 10:02:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 10:02:26 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup3(r4, r6, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_QUERYSTD(r9, 0x8008563f, &(0x7f00000000c0)=0x0) ioctl$VIDIOC_S_STD(r7, 0x40085618, &(0x7f0000000100)=r10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)=0x0) sched_getparam(r11, &(0x7f0000000080)) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000000)=0x97f5414) [ 283.099176] Restarting kernel threads ... done. 10:02:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = inotify_init() r3 = socket(0x2, 0x2, 0x0) dup2(r3, r2) 10:02:26 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) 10:02:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3305, 0x0) 10:02:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ppoll(0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f0000000240), 0x8) prlimit64(0x0, 0xc, &(0x7f0000000080)={0x0, 0x2}, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) 10:02:26 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, &(0x7f00000000c0)={0x0, 0x0, 0x1, @stepwise={0x4, 0x1, 0x81}}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 10:02:26 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) sendto$netrom(r2, &(0x7f0000000080)="0fc571ace93bd37a3a2a59143f2144d35ee0ecaf55354465fc6843f6d1db97f22493c8b7e724bd0e042aa2e7307d76509bc985f43793b0684dd3d56cd1ce30bdbb2609edc1e84a8da29584625d0e381665aec8226b5346220c6c49f0de465522c9cd5bf7130e83600e4b7511e5", 0x6d, 0x4000, &(0x7f0000000100)={{0x3, @default, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x40000, 0x0) [ 283.295795] Restarting kernel threads ... done. [ 283.311259] audit: type=1804 audit(1570356146.739:75): pid=12040 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942423134/syzkaller.Wb7Iry/255/bus" dev="sda1" ino=16914 res=1 10:02:26 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r5 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:02:26 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "b20d270f7caa9830583b8824e7f27c6abd23eefdc862079d858d551d4bb3af5f4fbfe063fc2efe69dec0b4a43dcca04aae9d989b2b954e4517f47b2db50076"}, 0x60) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) 10:02:26 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) socket$kcm(0x10, 0x0, 0x0) [ 283.476142] audit: type=1804 audit(1570356146.789:76): pid=12044 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir942423134/syzkaller.Wb7Iry/255/bus" dev="sda1" ino=16914 res=1 10:02:27 executing program 4: connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xf16a, 0x400080) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000080)=[0x5, 0x0, 0x4, 0x0], 0x4, 0x6, 0x3, 0xa78c, 0x0, 0x1, {0x9, 0x81, 0x101, 0x400, 0xfffa, 0xe6, 0xfff, 0xcff1, 0x0, 0x96ac, 0x7, 0x7fff, 0x1, 0x0, "c5f65597e4c4551258f127e290e14cb77c687a9a12ab11f0473ab58600969e00"}}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x624001, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000140)={'vlan0\x00', 0x1}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 10:02:27 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) recvfrom$netrom(r0, &(0x7f0000000080)=""/118, 0x76, 0x20, &(0x7f0000000100)={{0x3, @bcast, 0x8}, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f0000000180)={'vcan0\x00', 0xffffffff, 0x1}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:27 executing program 2: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) socket$inet6(0xa, 0xc0e94d0a2d725aa5, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x7fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) write$P9_RVERSION(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1500000065ffff0000800108133950a83030302e75"], 0x15) close(r0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = inotify_init() mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) 10:02:27 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x2) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000000)=0x9) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r6, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x902}, 0xc, &(0x7f0000000340)={&(0x7f00000000c0)=@ipv4_newroute={0x27c, 0x18, 0x400, 0x70bd2a, 0x25dfdbfb, {0x2, 0x10, 0x20, 0x4, 0x1fe, 0x3, 0xb4, 0xa, 0x2a00}, [@RTA_GATEWAY={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x4}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x4}, @RTA_SRC={0x8, 0x2, @broadcast}, @RTA_ENCAP={0x9c, 0x16, @generic="40065d2da30a41d4f593043026e6c4135ac69378424fb93726627e6b001d6b72ae56d5abed482fe84b27aafc20b36d107b213cdc8fa91c1a2fb5a817233ab193bbd0fcefc0bb43b92580a4d8671648bbc0b26e1cfab92e0b5a22d9674a7fd4f89c4c91f8b4e65c34098fbb1c1aca9f0d1c3afd353c0c55b843d998fb3332b6da8ac7b82fa62a36129f243f4bdc5c5627c6da84f2e4"}, @RTA_METRICS={0xcc, 0x8, "7857a30bfbdecec408ed198e47699b802bd6903c7bbffaf3d8444924372057d95d7c8f54c19a207ad3f26f5e4305d764b991f22bd7034a6009036aaad95da6dc923b74905238c4fdadc88bafb36028ec306aadd4df01bf0984a49d7ee4c0e221a277d1fa0e8326166fc2b5abe11bd4cf66e3080c09e8052e354163cf0745ba335e0dd44fad86319d4a1e356c2e1eeaab9005a6031c69ae49dbd054fa573309354737019b70bec2fb255590f8c0eafa73bb89e954c853fa3a449f9b678836a64b8913a40489efc5"}, @RTA_METRICS={0xc0, 0x8, "7d658382b1ca58c14fc5ce1a316bb2caf21b90ec24687adf7d78830fa1cad152dffbd2d34902907e056e70505346aa3d9dfd1aea8734a324224d5ddce3986731c63f5478dda127f71840040a551ad883c2f051f04f9f0c8379893d43eb97d1ff2db1cf0339f6dbd33346ce30eb46752f3b6178c4f434af2603b7e65254bff71fc1af533b4c700e8a55a34703f39994be044608f9ab0f0ec9cad8f99485d98bc1b190eb91da2b765ba8ac8ff696624e7709c459109fadd36fc9"}, @RTA_GATEWAY={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x28}}, @RTA_ENCAP_TYPE={0x8}, @RTA_MARK={0x8, 0x10, 0xecb0}]}, 0x27c}, 0x1, 0x0, 0x0, 0xc000}, 0x2040) 10:02:27 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0x800000fc) r1 = socket(0x2, 0x2, 0x0) creat(&(0x7f0000001480)='./file0\x00', 0x0) dup2(r1, r0) 10:02:27 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{0x5, 0x8}, {0x3d, 0x2}, {0x22, 0x1}, {0x7fff, 0x9}, {0x3, 0xa00}]}) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) pipe(&(0x7f0000000000)) 10:02:27 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000140)={0x18}, 0x18) 10:02:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xffcf, &(0x7f0000000100)={&(0x7f0000000000)={0x94, 0x20000000000036, 0x829, 0x0, 0x0, {0x1, 0x1000000, 0x1000000}, [@nested={0xffffffffffffff80, 0x0, [@typed={0x3b, 0x1, @ipv6=@loopback={0x4000000000000}}]}]}, 0x99a1}, 0x1, 0xffffff7f0e000000}, 0x0) 10:02:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 10:02:27 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0, 0x3d}], 0x2) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) 10:02:27 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) r3 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r5, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b808000030090000616d6f6e670000000000000000000000000000000000000000000000000000002008000000000000140400000c000000000000000aaaaaa9000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008c7f8f1b44f0000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009abde2255a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffff90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2573bd04a33729f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000003f7f1c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d3d2e85100000000000000000000000000000000000000000000000000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c7700"/2448]}, 0xa08) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_DELDEST(r7, 0x0, 0x488, &(0x7f0000000080)={{0x32, @multicast2, 0x4e24, 0x4, 'rr\x00', 0x1a, 0xffffffff, 0x47}, {@multicast1, 0x4e22, 0x4, 0x1, 0x6, 0x8}}, 0x44) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_S_JPEGCOMP(r9, 0x408c563e, &(0x7f0000000140)={0x5bdb, 0xe, 0x6, "8e2a951b264a9e5f2eec4b121148df791c515f53781174b424efa66dbfebd34e1e54f2f267a93c5ad9149fdde75bec51b48807241d80501b4bf9fe9a", 0x30, "cd88e483e8af7a5d9bf5b573351a5035f91e651de5a271d8243322b56f251a37d032621380ec44ed93e3ff0714b00b8d5736ca580fbd4de010e17539", 0x98}) [ 284.004817] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. [ 284.041748] netlink: zone id is out of range [ 284.049507] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max [ 284.056391] netlink: set zone limit has 8 unknown bytes [ 284.067178] ebt_among: src integrity fail: 200 [ 284.089841] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on sz1 [ 284.094617] ebt_among: src integrity fail: 200 [ 284.141617] hid-generic 0000:0000:0000.0003: ignoring exceeding usage max [ 284.182576] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on sz1 10:02:27 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) socket$kcm(0x10, 0x0, 0x0) 10:02:27 executing program 4: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r2 = socket(0x2, 0x2, 0x0) dup2(r2, r0) 10:02:27 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffff268, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 10:02:27 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)="2e0000003900052f005a80647e63940d0224fc0010000200000535820900068004001700d1bd00000000b5a8e438", 0x2e}], 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 10:02:27 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r0, 0x0, 0x0, 0x0}, 0x30) getpgid(0x0) syz_open_procfs(0x0, 0x0) 10:02:27 executing program 2: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) socket$inet6(0xa, 0xc0e94d0a2d725aa5, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x7fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) write$P9_RVERSION(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1500000065ffff0000800108133950a83030302e75"], 0x15) close(r0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = inotify_init() mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) 10:02:28 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20c0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)={0x200d}) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, &(0x7f00000000c0)=""/85) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:28 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r3, 0x1, &(0x7f00000000c0)={{0x77359400}, {r4, r5+10000000}}, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x4d4, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 10:02:28 executing program 0: r0 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) ftruncate(r0, 0x1000000) ftruncate(r0, 0x0) 10:02:28 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x1) connect$x25(r3, &(0x7f0000000080)={0x9, @remote={[], 0x3}}, 0x12) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)) 10:02:28 executing program 0: r0 = inotify_init() r1 = socket(0x2, 0x2, 0x0) dup2(r1, r0) 10:02:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1a55eb7b6a2c15197200000000ff7ff3ffbc0980ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x300, &(0x7f0000001fc0)}}], 0x400000000000047, 0x0) 10:02:28 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_ENC_INDEX(r4, 0x8818564c, &(0x7f0000000080)) 10:02:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x304}, "b2a7252d7667f45f", "079f0000f400", "8be57d14", "a435b8f1d226a342"}, 0x28) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x0) 10:02:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffe83}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000004105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700000000000000ba90a27854bb86020000ff00000000"], 0x80}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x393, 0x0) 10:02:28 executing program 4: r0 = inotify_init() r1 = socket$caif_stream(0x25, 0x1, 0x0) dup2(r0, r1) 10:02:28 executing program 2: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) socket$inet6(0xa, 0xc0e94d0a2d725aa5, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x7fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) write$P9_RVERSION(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1500000065ffff0000800108133950a83030302e75"], 0x15) close(r0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = inotify_init() mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) 10:02:28 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80020400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, r3, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0xe}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0xe}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x45a}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}]}, 0x70}}, 0x40) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x1, 0x40200) getsockopt$netrom_NETROM_T4(r5, 0x103, 0x6, 0x0, &(0x7f0000000040)) 10:02:28 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000100)='./file0\x00', 0x800000000000ff7, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=[&(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001680)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000000380)=[&(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000600)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001040)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000140)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001480)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f00000003c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001880)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac']) [ 285.486352] tpacket_rcv: packet too big, clamped from 796 to 4294967280. macoff=96 10:02:29 executing program 4: fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x4, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x1, 0x4) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f00000007c0)='\xd7\x06\xac>(\x10\xe0\xc1\xd9\xb6\x01\x97\x97\xe31\xd1\xe5\xebw-\xb7\xc3=\xb8|B\x12\xcbk\x92]\xc34;W\a\xdd[\x96\xbe\xcb\x9b\x8cDS\xa1\xd4H\x114\xc1f*W\x01r?+\x05\x8b\xa6G\xb8\x7fS\x0e\xbf\x06\x1f^\xa3zv\xc60\xa5\xd8\xe3\xee\x19p\x9aW]\xb5T\r\xbam\xd2\x9eR\f^f\xa5\xdb\xc5\xe2\xa3\x16\x1bs\xa3)_?\xc9\f\xa35\x10\xe2\xd4\x86\f\x91\xeeY9\t \xaf\xeb\xf3\xed/\x9c\xa9\x86\x95E\x98)\xcb1!T\xbc\x84=\x1feQ\xf9S\xd9\xbd`]\x16\xbf\x03\xb5Co\xacb,\xd3\xe6\xbf\x9a\xecN%\x9c\xbb\xb0\x98\xf0\x93PG[\xeb\x92\xfd(\xd3\x96J\x14\xfc\x10\xff\tE\xcae\xe2\xce\x1cV|2Z\x19\x8d\xb7\x13\x9c\x9b\x04\xb9$\xfe\xd9', &(0x7f0000000740)='!\x00']) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r4, r2, r3, 0x0) 10:02:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffe83}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000004105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700000000000000ba90a27854bb86020000ff00000000"], 0x80}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x393, 0x0) 10:02:29 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchmodat(r2, &(0x7f0000000000)='./file0\x00', 0x1c0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:29 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000100)='./file0\x00', 0x800000000000ff7, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=[&(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001680)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000000380)=[&(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000600)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001040)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000140)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001480)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f00000003c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001880)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac']) 10:02:29 executing program 0: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="ea3860d10c6d0000000000000000003d461026fe799ae820b2997488e57026408ba40bc2e5c994bdbd0d4f902fdb5be4c1e5ff5af3406ec0"], &(0x7f0000000140)=0x8) 10:02:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffe83}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02020609100000000000004c9e0000000200130002000000000000000000004105000600200000000a00000000000000000500e50008070000001f00000000000009200000000000020001000000000000000002000098a805000500000000000a00000000000000ff1700000000000000ba90a27854bb86020000ff00000000"], 0x80}}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x393, 0x0) 10:02:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0x1d3}, {0x0, 0xff6a86e9a59a157e}, {&(0x7f0000000000)="a48b12f728db4b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2ce90ccb15322e200000000000000960f53691a655eb6989d32772cf2eebb1f6c785d6382fa7776ea267d32109a5633", 0x53}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 10:02:29 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000100)='./file0\x00', 0x800000000000ff7, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=[&(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001680)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000000380)=[&(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000600)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001040)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000140)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001480)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f00000003c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001880)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac']) 10:02:29 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000080)=""/222) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) tee(0xffffffffffffffff, r0, 0x0, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGETLED(r5, 0x4b31, &(0x7f0000000180)) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 286.006353] IPVS: ftp: loaded support on port[0] = 21 10:02:29 executing program 2: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff}, 0x0) socket$inet6(0xa, 0xc0e94d0a2d725aa5, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x7fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000100)='\\vmnet0?\'`@{,vmnet1em0user\x00', 0x4) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) write$P9_RVERSION(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1500000065ffff0000800108133950a83030302e75"], 0x15) close(r0) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = inotify_init() mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) 10:02:29 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000100)='./file0\x00', 0x800000000000ff7, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=[&(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001680)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000000380)=[&(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000600)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001040)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000140)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001480)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f00000003c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001880)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac']) 10:02:29 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000000c0)={0x30, 0x6, 0x0, {0x1, 0x0, 0x7, 0x0, 'user_id'}}, 0x30) 10:02:29 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) r3 = accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}, &(0x7f0000000080)=0x1c) write$P9_RWALK(r2, &(0x7f0000000100)={0x71, 0x6f, 0x2, {0x8, [{0x4, 0x3, 0x8}, {0x91, 0x3, 0x6}, {0x86, 0x4, 0x7}, {0x33, 0x1}, {0x84, 0x2, 0x4}, {0x10, 0x3, 0x6}, {0x8, 0x2, 0x6}, {0x2, 0x3, 0x1}]}}, 0x71) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000000c0)={'teql0\x00', {0x2, 0x4e22, @local}}) 10:02:29 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000080)={0x14, @output={0xe8fa26f0baf02f2, 0x1, {0x400, 0x8001}, 0x400, 0x3}}) r4 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) 10:02:29 executing program 3: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_selinux(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', 0x0, 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f00000000c0)={0x30, 0x6, 0x0, {0x1, 0x0, 0x7, 0x0, 'user_id'}}, 0x30) 10:02:29 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=[&(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001680)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000000380)=[&(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000600)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001040)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000140)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\aJ\xce\x7f\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\r\x85\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001480)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f00000003c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<\xbaC\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9dB_A\xec>k*\x13\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001880)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac']) [ 286.795766] IPVS: ftp: loaded support on port[0] = 21 10:02:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0xff7d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000140)="66b8b9000f00d0c7442400b7fe0000c744240250260000c7442406000000000f011c240f78ba0000c0fe660f3834860a000000c4c275ac7c2c003e3e0f79970c00000066baf80cb8caae098cefb8000000000f23d00f21f835300000040f23f8ecc6f84c0f32f30fc736", 0x47}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x40, 0x0, 0xfffffffffffffdd4) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000540)=ANY=[@ANYBLOB='(\x00'], 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:02:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f00000000c0)) r2 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x20000) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x100, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fcntl$dupfd(r4, 0xc0a, r3) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r7, 0x0, 0x0) r8 = syz_open_procfs(r7, &(0x7f0000000140)='net/udp\x00') ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400204) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) accept4$nfc_llcp(r10, &(0x7f0000000180), &(0x7f0000000200)=0x60, 0x100000) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, 0x0, &(0x7f0000000040)=0x74fe1027) [ 287.132425] ================================================================== [ 287.140118] BUG: KASAN: null-ptr-deref in kvm_write_guest_virt_system+0x64/0x90 [ 287.147560] Write of size 24 at addr 0000000000000000 by task syz-executor.0/12302 [ 287.155254] [ 287.156877] CPU: 0 PID: 12302 Comm: syz-executor.0 Not tainted 4.19.77 #0 [ 287.163790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.173129] Call Trace: [ 287.175755] dump_stack+0x172/0x1f0 [ 287.179375] ? kvm_write_guest_virt_system+0x64/0x90 [ 287.184523] kasan_report.cold+0x199/0x2ba [ 287.188750] check_memory_region+0x123/0x190 [ 287.193144] memset+0x24/0x40 [ 287.196242] kvm_write_guest_virt_system+0x64/0x90 [ 287.201189] handle_vmread+0x7fe/0xa10 [ 287.205069] ? handle_invpcid+0xa80/0xa80 [ 287.209248] ? __lock_is_held+0xb6/0x140 [ 287.213302] ? __lock_is_held+0xb6/0x140 [ 287.217360] ? handle_invpcid+0xa80/0xa80 [ 287.221498] vmx_handle_exit+0x276/0x16b0 [ 287.225633] ? lock_acquire+0x16f/0x3f0 [ 287.229594] ? vcpu_enter_guest+0xf15/0x5ed0 [ 287.233997] vcpu_enter_guest+0x10ca/0x5ed0 [ 287.238345] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 287.243370] ? kvm_vcpu_ioctl+0x181/0xf90 [ 287.247510] ? emulator_read_emulated+0x50/0x50 [ 287.252165] ? lock_acquire+0x16f/0x3f0 [ 287.256126] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 287.261605] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 287.266452] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 287.271464] kvm_vcpu_ioctl+0x4dc/0xf90 [ 287.275425] ? kvm_vcpu_block+0xcc0/0xcc0 [ 287.279566] ? mark_held_locks+0x100/0x100 [ 287.283818] ? __might_fault+0x12b/0x1e0 [ 287.287877] ? __fget+0x340/0x540 [ 287.291319] ? find_held_lock+0x35/0x130 [ 287.295368] ? __fget+0x340/0x540 [ 287.298812] ? kvm_vcpu_block+0xcc0/0xcc0 [ 287.302972] do_vfs_ioctl+0xd5f/0x1380 [ 287.306891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.312460] ? selinux_file_ioctl+0x125/0x5e0 [ 287.316948] ? ioctl_preallocate+0x210/0x210 [ 287.321343] ? selinux_file_mprotect+0x620/0x620 [ 287.326797] ? iterate_fd+0x360/0x360 [ 287.330611] ? nsecs_to_jiffies+0x30/0x30 [ 287.334754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.340298] ? security_file_ioctl+0x8d/0xc0 [ 287.344697] ksys_ioctl+0xab/0xd0 [ 287.348141] __x64_sys_ioctl+0x73/0xb0 [ 287.352138] do_syscall_64+0xfd/0x620 [ 287.355940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.361127] RIP: 0033:0x459a59 [ 287.364313] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.383203] RSP: 002b:00007fb6fb66dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.390899] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 287.398167] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000007 [ 287.405427] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 287.412684] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6fb66e6d4 [ 287.419949] R13: 00000000004c2e48 R14: 00000000004d6978 R15: 00000000ffffffff [ 287.427388] ================================================================== [ 287.434729] Disabling lock debugging due to kernel taint [ 287.443271] Kernel panic - not syncing: panic_on_warn set ... [ 287.443271] [ 287.450644] CPU: 0 PID: 12302 Comm: syz-executor.0 Tainted: G B 4.19.77 #0 [ 287.458981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.468379] Call Trace: [ 287.470999] dump_stack+0x172/0x1f0 [ 287.474614] ? kvm_write_guest_virt_system+0x64/0x90 [ 287.479755] panic+0x263/0x507 [ 287.482942] ? __warn_printk+0xf3/0xf3 [ 287.486820] ? kvm_write_guest_virt_system+0x64/0x90 [ 287.491910] ? preempt_schedule+0x4b/0x60 [ 287.496062] ? ___preempt_schedule+0x16/0x18 [ 287.500491] ? trace_hardirqs_on+0x5e/0x220 [ 287.504803] ? kvm_write_guest_virt_system+0x64/0x90 [ 287.510008] kasan_end_report+0x47/0x4f [ 287.513966] kasan_report.cold+0xa9/0x2ba [ 287.518100] check_memory_region+0x123/0x190 [ 287.522492] memset+0x24/0x40 [ 287.525623] kvm_write_guest_virt_system+0x64/0x90 [ 287.530536] handle_vmread+0x7fe/0xa10 [ 287.534411] ? handle_invpcid+0xa80/0xa80 [ 287.538665] ? __lock_is_held+0xb6/0x140 [ 287.542725] ? __lock_is_held+0xb6/0x140 [ 287.546783] ? handle_invpcid+0xa80/0xa80 [ 287.550930] vmx_handle_exit+0x276/0x16b0 [ 287.555061] ? lock_acquire+0x16f/0x3f0 [ 287.559016] ? vcpu_enter_guest+0xf15/0x5ed0 [ 287.563409] vcpu_enter_guest+0x10ca/0x5ed0 [ 287.567723] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 287.572829] ? kvm_vcpu_ioctl+0x181/0xf90 [ 287.576971] ? emulator_read_emulated+0x50/0x50 [ 287.581633] ? lock_acquire+0x16f/0x3f0 [ 287.585599] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 287.591034] kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 287.595860] ? kvm_arch_vcpu_ioctl_run+0x457/0x16b0 [ 287.600863] kvm_vcpu_ioctl+0x4dc/0xf90 [ 287.604823] ? kvm_vcpu_block+0xcc0/0xcc0 [ 287.608967] ? mark_held_locks+0x100/0x100 [ 287.613298] ? __might_fault+0x12b/0x1e0 [ 287.617343] ? __fget+0x340/0x540 [ 287.620785] ? find_held_lock+0x35/0x130 [ 287.624839] ? __fget+0x340/0x540 [ 287.628291] ? kvm_vcpu_block+0xcc0/0xcc0 [ 287.632420] do_vfs_ioctl+0xd5f/0x1380 [ 287.636296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.641814] ? selinux_file_ioctl+0x125/0x5e0 [ 287.646292] ? ioctl_preallocate+0x210/0x210 [ 287.650681] ? selinux_file_mprotect+0x620/0x620 [ 287.655447] ? iterate_fd+0x360/0x360 [ 287.659231] ? nsecs_to_jiffies+0x30/0x30 [ 287.663371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 287.668892] ? security_file_ioctl+0x8d/0xc0 [ 287.673295] ksys_ioctl+0xab/0xd0 [ 287.676743] __x64_sys_ioctl+0x73/0xb0 [ 287.680624] do_syscall_64+0xfd/0x620 [ 287.684411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.689585] RIP: 0033:0x459a59 [ 287.692769] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.711724] RSP: 002b:00007fb6fb66dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.719421] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 287.726692] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000007 [ 287.733964] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 287.741222] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb6fb66e6d4 [ 287.748472] R13: 00000000004c2e48 R14: 00000000004d6978 R15: 00000000ffffffff [ 287.757200] Kernel Offset: disabled [ 287.760822] Rebooting in 86400 seconds..