[ 34.526011] audit: type=1800 audit(1551937345.917:30): pid=7378 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.2' (ECDSA) to the list of known hosts. 2019/03/07 05:42:36 fuzzer started 2019/03/07 05:42:39 dialing manager at 10.128.0.26:42649 2019/03/07 05:42:43 syscalls: 1 2019/03/07 05:42:43 code coverage: enabled 2019/03/07 05:42:43 comparison tracing: enabled 2019/03/07 05:42:43 extra coverage: extra coverage is not supported by the kernel 2019/03/07 05:42:43 setuid sandbox: enabled 2019/03/07 05:42:43 namespace sandbox: enabled 2019/03/07 05:42:43 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/07 05:42:43 fault injection: enabled 2019/03/07 05:42:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/07 05:42:43 net packet injection: enabled 2019/03/07 05:42:43 net device setup: enabled 05:45:46 executing program 0: socket(0x0, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x0) syzkaller login: [ 235.207797] IPVS: ftp: loaded support on port[0] = 21 05:45:46 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xffffffffffffffa9) recvmsg(r0, &(0x7f00000007c0)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x102, 0x0}, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) write$P9_RREADDIR(r1, 0x0, 0x0) [ 235.297330] chnl_net:caif_netlink_parms(): no params data found [ 235.346577] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.354392] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.362834] device bridge_slave_0 entered promiscuous mode [ 235.371004] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.377418] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.385577] device bridge_slave_1 entered promiscuous mode [ 235.406739] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 235.418091] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 235.438642] team0: Port device team_slave_0 added [ 235.453026] IPVS: ftp: loaded support on port[0] = 21 [ 235.460784] team0: Port device team_slave_1 added 05:45:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$UI_SET_PHYS(r0, 0x4008556c, 0x0) [ 235.562773] device hsr_slave_0 entered promiscuous mode [ 235.649621] device hsr_slave_1 entered promiscuous mode 05:45:47 executing program 3: socketpair$unix(0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), 0x14) [ 235.709032] IPVS: ftp: loaded support on port[0] = 21 [ 235.738534] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.745110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.752306] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.758663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.917969] IPVS: ftp: loaded support on port[0] = 21 [ 235.945016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 235.953101] chnl_net:caif_netlink_parms(): no params data found 05:45:47 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001080)={0x2, [0x0, 0x0]}, &(0x7f00000010c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001240)='net/dev_mcast\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/4096, 0xffffff5c}], 0x100000000000012d) [ 235.997229] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.016983] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.040701] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.052922] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.072252] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 236.118955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.140924] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.147305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.171193] chnl_net:caif_netlink_parms(): no params data found [ 236.207534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 05:45:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000000c000100aaaaaaaaaa00220008001b0000000000f3a7e6ab01a99577d690038adbfd4d248d4a8763667683f0776928fc9f36ffae61ad24a0048d3f6e77dff4af4ec81c7faa4e638de7254abd4f"], 0x1}}, 0x0) [ 236.216688] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.223112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.253848] IPVS: ftp: loaded support on port[0] = 21 [ 236.280324] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.286701] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.296795] device bridge_slave_0 entered promiscuous mode [ 236.306931] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.345384] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.352222] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.361437] device bridge_slave_1 entered promiscuous mode [ 236.378273] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.392917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 236.400210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.407785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.423404] chnl_net:caif_netlink_parms(): no params data found [ 236.435791] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.450959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 236.458437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 236.483450] IPVS: ftp: loaded support on port[0] = 21 [ 236.504015] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.510544] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.517325] device bridge_slave_0 entered promiscuous mode [ 236.527231] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.534078] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.541503] device bridge_slave_1 entered promiscuous mode [ 236.565285] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.571953] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.578737] device bridge_slave_0 entered promiscuous mode [ 236.585717] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.592129] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.598984] device bridge_slave_1 entered promiscuous mode [ 236.617906] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.626845] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 236.636981] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.659775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 236.667193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 236.675478] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 236.688953] team0: Port device team_slave_0 added [ 236.717424] team0: Port device team_slave_1 added [ 236.725250] team0: Port device team_slave_0 added [ 236.731470] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 236.739544] team0: Port device team_slave_1 added [ 236.757305] team0: Port device team_slave_0 added [ 236.763847] team0: Port device team_slave_1 added [ 236.822037] device hsr_slave_0 entered promiscuous mode [ 236.879674] device hsr_slave_1 entered promiscuous mode [ 236.991924] device hsr_slave_0 entered promiscuous mode [ 237.049661] device hsr_slave_1 entered promiscuous mode [ 237.133428] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.139833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.146410] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.152799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.211993] device hsr_slave_0 entered promiscuous mode [ 237.269685] device hsr_slave_1 entered promiscuous mode [ 237.313784] chnl_net:caif_netlink_parms(): no params data found [ 237.341225] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.348332] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.364075] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.408097] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.425146] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.433037] device bridge_slave_0 entered promiscuous mode [ 237.444646] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.451039] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.458004] device bridge_slave_1 entered promiscuous mode [ 237.516037] chnl_net:caif_netlink_parms(): no params data found 05:45:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) recvfrom(r0, &(0x7f0000000040)=""/104, 0x68, 0x40, &(0x7f0000000100)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x9, 0x81, "b64ec0e346608fa124dbd669733705b5e465e80a80761c10cec56f54afdc99bf22f8c11b0c41dd1ae0530735c321f4b8fc43740f5bd937d86193e6f7e5be21", 0x30}, 0x80) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x2f8}) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000180)={0x2, 0x0, 0x2080, {0x0, 0xd5b8fd374a5bb125, 0x2}, [], "7e534dbc9d40278306b942fb1dc6d50612f438cac4ef0f27b60a82d620c2d3cd681eb9c7ca829c85f2f1e5f1be27a1762e84f323116651b958e3ed1064c722de89d57dfc251de990c9251c510a420942b1763b031a8f64295e97775811b8874eb0c3c6f606df68f5a1a45bc5412f03246086a69142fa144a8406f8ca83f1b31acddb3b27a40412db3967e8a9cfcb50b943a21e2e52f0a7383efba8b9c3d83bdd9b463f507ab4b944f1dc8f8aa8138b067de836671786bdb215d9e24982b45db64bd068038506fe084d0726a02437284023a56190c129597e916121e16a74de02c3feaea3b996773b8bf00288f80649135d3d011a2d53663121097dc6bdf03195160204d9103d227c8f5b1ab5b711ee389a5154f7418af31c5d9e1ea4e5e81cd724fceccbf98c6d05acc7b51760589dcf0d7ed38c33a2a192386f872e43f2119f29c660a054cfa6b3408df726016e0caf0f8480b3520a50f638e805ead65c94613faae97b25d28016147dc98c3f9c3f79d0d660e97af17c3f44746b6f2d1067db633decdd380f1eec4bbdbedd33f6a141e15d425db9902eb97f521487b920f79571d382edf4c31cbf134663a2842f31a4e313f1198d7b7275e7de3f368bfff09023fff83eef7834cf7cd680e2589a28655b8f44876b4ca0c8b815d3a35712c338a06ab354b9dcbfd28a2f65486d789543e7ac9fbb2251ed84d20a98b9c0ae540af6a49d91bb522f3d9b9541827ca156199f967820e9de0291d13f38b374d90ab054a793321222ddfb5221c0135ce12c90e67fd524a45b1f54fd9286d675277aa75c321eb50e4f44dd71bfb07c979b9fee9b18086388120736a510dba6887c048a035d411ef47a8e57af7ae323b1ab62a7567775ae6a34fa36209754e94e1369a8988a9e2b6c17776e312a652a96cf86965f5761fe4389c976cf38cd22a555d42b165e59687aa320f7de9ba31ecac262a90badd79c7c58ec7a578b9f755b0b7de267a90af8f9f670131943a480668e245017c9913b3903c2b9d675a104d40cb5f64196b7e98b7e28d92fa1bea26ea8cc07dabf9906456014fece33e82820a955308a27fd1970db95df60629440cc4cb5d2f22c0bb518790444167ddec337d958a1ea0799fe27e8e75099f7df5ceb9c192d55b637545b6ba16e5c73022a873be4ef8e95238fba1b96ab44ff1a7eddbf3ad8e45e4c4b08748166e6ee866e6dc830b5f09ff218a1ab8f9792bfc593b876b59fdc575482a8e797ebf6ce1ec90bcd8386a442436e3ad83aa6fdd5afb442ebe277266c16d1ce0da9afdeb958a91ca86eb05dc0f7b5ceea3d0904c75ece91b105e3b09712ac72cb9958e0e3867a7a5f24a153f529fc6ffd6f01f82117df129a854eb8c89385ea7535b58884b2d291ce6a878e04a7c94a57ef0d769453d4fa764d965383f47079ba37a72b432978c2653d3ddb5dac8dc96220284432d66c58524d38437c418a95e2507dbe9f98203fbdddd8d2eb6bfb2d4c49811b965f375e603fb3312f8e054ac7b0a0666c9a376fafd4ba98090bf0301a3d2b9ec2bc70a31c7fcb9c2e5045e0a89f69b5dcb8db2d31ca317c82ef089d37b21cfb28710210c4e2d04c69c0dcf7a43c60d6ca73396cc3260a466f8a66a486e3e90db6e27bab385e6a067967e7c95a2d373883ac25dcbd933fa94421252112ea1a6f8f36ef45bb960ac8662480c7d620e21ae06ee74b963c0840f1b50626002349d3c4073725dd067a19c9a4943069338f994c0a66f27c431ed856f3009c61e467dfeeae49a11864c9dff003eb5313cebf4644b7f82acea163f5adeb6e149ab11543cf62f33b250e49ebb2fa29e6b6dc77b3e4a73178d534b5e24d743a8005f669c06220feae630df4a26326a5fef0061ff7bc9b34431357804ae8181a8373a1e041250f09df3bb7af79310f505045190b5f86eadd19f84d09f39948c020768700cb491d8527e204bd5e88370781a27cc899daeba8dc6865ccd7e667e8c4def4d557b6275fd686f17cc07ec4e6d146f5405d10e169b78f27ecff2909210260057236520289e41795779ef5902a99a278d109f5fda3b8767187a9ba7ec52b576db3a1e073275e0135186095735eeebeec1917f28d1305a863aabd5d38de6c6a10316548014d52d5f36a8aef28c10d4611c2213797cbf110c8c289d7a5d2d5901dd287a51348aa2fb152fa07595e3aaef392f9c949dd525fc7623f14ae692655b7d598cbc3b9ccfd23ed7d76d25eb0b6ba7eee7334b1cc19eb9cf8492d71fceefd7cb34a9095aa91a9aa033e5992d4bb1acd246a9dd16e1d79920d26bfd9b2716d5d3d35f2422f673191863423dda271f345a0636a5c4204bbd6a8ca836554ca23975ff9124a091b1c97fc66ecb2b0747f5a42f2ed960eab418985cb6ef5000f72930219808486365ac41b4f6fe9caa2c9ba4eef2d2fbbae4811fa8efe2e614cbf74f97af70e679a46bdf06996766968b7437d151ae0ea840b7c88ebfb18e4d2a7fad0f96e384b631269242445023999a248b5116ddd0ae5159cafac1449d3f76180525727dd86881a9028ae586da8f67338b3f68c5edee638f243b00e805f5df7c65600016fba59dae12ce3a8dfd35ae55021a331b6350f1cfc4470766fc0941e996c9dbcd6c931e2ca8cfb348084caae44c06a43ba634cf49e58efad6d2c86d05d9c865ed9f77d6664440750a58f8fe82042e4676b18641d13dffa6ea4e298dbb4a8c06219c050f85d3acf6f81555ae91a54fa2d555d609b677f14816f255155c08051fbcdd2c55bbbbb941cbf3a1a1bd119edf69a7dd4404d5d630f8f5f51a294046c745411c06ba79931967fd0dd14584ee523d376cd671ea457525b555d3d0ff9a574f066db01ccfa4dd1cd5fd912050ab26325c7735012932d4648623e0bd89bb79b51f49f5db3923fd6aeeb4cc96a7550fae053f70fc44ba77384c415a91418261dea6013ff9887b70efd3f4b770eb8e41307181d04973e64c2154ae38b4a9923f0838b2879a6ec6c3283b5d1573fd10468aee692f36ca232cd0a11a29d36e9d3b2edea159eefa6b24de71b1f19c927e663b038bee0a679f37176fb466581ec059e33693c519b8ab2591f5a9d17c928dd722f32abecf1a767406c7053d79d65e590d8e6070b9ea5d8a7562b401e792b1d226aea4b5768e17a6ecf30a77859070c302602ae65c6828141b201539743f86ec8b659cd9714711c96ea4af4757452602f2cee93646484900902d0d4b88001e73c839ba86586986942d1ddd16c141e8b36ea5c22376c61021710ea2cf95ac8c9e656003db15741916e38faaac0c2e46d5e627b9ab5ff2ee21ddcec7b58272a3206086f6c90878383d0f2cfe6464708271c5e6b2b8729bc8367fbafec2c405b0600fa69a1c5285300b5057b1651aa96f9e1ef3701221c1afa9f750084da502c763291d42207e19fb533ac4513e66fca29551e0a139f0c8922d245d1e09786241dbbd3428539950c002119b478378367e5b33c60147679ecdce8c5371e979708a9a0f324dba6638e5346d3ddfb9ebbff89f61ae751b09c703120fd5f19c8ba3e6e77488a1fc244c0f125244adc0840035b878907512ad1e4e19eeb45340eca6f80b68c8d8afae37806002f53259438d1fcb40e48f663201bb4287decf9a385021526b4be9c7094d0709277628dc1fdc63c1ef8176ce54a88d7103e150f030fa80841d52fe2b85957803d733a2a8a52cc9e236de470388bd554512fcce1ec50f96c4ce4d1bc3d1b5702ccc93abbc5c8f7f758f59ac655586829afa1524581c6fa91d935e646c56ec38e7e648ba999f3774a6092a4d3bb8f98adb272f8bc219e53dd316d3c0eaade714b371d285d2a30aa15a147fcbc2b25023e84d7ea0cb70888cf939ace548119abbae6fa68d455816bbb968a09c3ca4c16dc3a62f3f6c5c5a163392fd8c8f72a90e2a81b44c49ab4bfdca2e084dbbb4cf61a107fc162a6301d758ab935f342d239244d0f3e1cd274afff589d949829a0bc205c2b6f729ebf56f4669f59a05f449b898459246452aa92323b28622462f215112293cafad0ba6c8ff377c5ae8057671fc25b328b83556fd7342f6893463de960820d47f3aa8c390821bf1549f6d0f417262f0038f60adb3057a80708289e1e6e13b6f633158d91de4e58324b1d96e9d661a94c1208663458f354d09c46f350e06b6bdfe3d0c4267e52d0fe355b3e1368a082583e042ac6703c9c99c3376762d847e709559d8636aa0f0ae8c1e47f25b74300ee3bb64e026abeca9bf1709b134b30e67e422581f79d4c6aad10a56a0149898075d96590eff781444278d5814c62277afbdb4bbfd27aafe465be71c74d1833c4f8f9e60d15d0b2ebceac6d2fae22ea842ed6b4da1d4ff27d793afcb7f303f339270d2d9e494d0e4ef00a3dcf76bb86e372ed1e9019097ac548256923e43b356d70d23ad415f419fac8f07f6438060a088f4155f2d52664c2b96377bf44e990d633dc2c7b88ee166ab6786a12851d941228a3bef81f01e41645779df80fb1e57544b731dccaafd665c51796a66efa1477b84f21b06e752d233788f59d738e54a5966a359d6249ec374137c0309364986c63448ffe9712540e58d6df8e6a2ea281a2cf1d957d8f9faad13d1a4ca8d55995456f02b0dfdba0a511615f342a92afbb9018369dcb5830f13e68a03d18b4bb813d9778b96d2065bd52ed5646cd84804fd7260bf5d474c2aca091e37305d1ef1ed0af026edda96b80404fc518ea951c535983571f96b4dafb41438612932e65e72fedd3cf01837de617e834cdb11fd7caa80da2dd6cbbeaffa10372603df4bbf7cf1602574a9fae4eee0bc2b9898616492561b605f12ec3f85ae30334e0a015ff48d19c836fef8d700b15bd069b0976b9767a4e502a5a2a473aa76ab30a3244b06f14719d6cbd279c13466efdc5315547033ca59187a3a496b67ec6dffef59c9b9940f76fa5840901813807b448ba9398a55a4f6a2eeebb5b168174fdfd7de498b4b75caf74cbe8d2f5efd403220a7ea5a84dd63609d33070425754b01595fe8f9f60dc5c1b1e282f2699a7b3a6b83614c041c23e29aabcfe818a55b81f146b8aa575ac42a0e37faa6d8510092b48d2dd5a87fe04d89c740671b1ebd8631b7c9b967f044fbde21f870ce6ae885b1caedbc0957dc2c783c7c05fec698030d899d2a5f3cc74581ca050bd12cac07871b9b3f0b6231828fc8b7cfa5b3b71dc740a4420d93cd355e4ac3c32579af738d4da3c0c766fe5d17e3e7e7b48e534c122ede9a6950a675aa520736da3ca4eee409fb482aae9869285b8f08d93aaa704d039e488592f7bb7ec655efa2e3e0ac98ecccf78c6bc805dbcefbf7aeb4a8dd1ddcdbb3c63536f6c130400d3b47a84aee2f32950e694265e4a30adea8b9543fe378137f4cafd44ab36f667f838f5c83e693a94f9d5fd3fa607556a66e6ca3b173e259a594f3f59517db815d46119bfe6c2960d59c20a29d13f8e50e888d2b9de84de174d5c37dddf78428567d1e5156b13d60cb4cc1cd0a7edd45df0ac24c63d169eec72384eebe22c411aadb5333705b02870f8b1e8a0e91ac840e1a186d092688f8a63f22401c1937ccbccbf742507f8c764c778f9d28830e0ed80b96a2e259dbb0a29df4671684e655667af16975398ec95f64872772344a5c176df040743a9376fcb8501332640d4a6fb4f4c342d1a1a5e463f5e21a97be4c041fd631eabde8d14a014492c6fea2dfbd538f1e597489644368bb47eca975a3fa83e6784b6f392633ec18401e486e744f359895a", "84739a5b85e750cdade5bf17f3beda04d4d5f044a3c4af09d6a26e9b12f5abd7caf4a8ba6e470cd9cf96495f163dcb5b4bc5b6717ef5b912833fbd8cf4c35c2a8764239341b10fe984ddbc81faaa69a2766d902838eed01cfaf79760cb7e732b5f2d347678959f2bc3a4026e534b703acde6a5f4888468c536c6f2aab2196446e91161f6fd9d369aee7db898d84083945de3ccc7b6b5a7b7edd32e42c54ad4797ba0a6a20df5300ec442d0304670ed6b9288c2bdcb93c39462d441a07c79fc5c2825ef9e2a2fb2bdce0237c128a9385e3a388213b40556b71717dcf59bf2861a9a8b10fa1aaaae69a843ba6cb30784313dd940f20e23ea0ac8e2728c55c455a8150d274816879c7674d79e018d2bae3807dda21513724dafc7dc23cae0818aa97d9a9171a160b46e84c2ecfb6cefc367142e481827814c0dad8311cd0ef930f5ab3159dcd0c92666fd0fd5008a2c44941e5162683e78a777e2bcd284c063e5fd9c4b6bd0ce3f433a83e1c1d3780aa30e84af6d8ec7f64db50024bec25515e17d9490f0cfc5c812b9aebe98ab8937f77b9346493fd676dfbc01c062ce03eb1790492a009c6fa48904a89af7f47fdce9c0ebb4ef918539374abc79760835f6985d64447163a6e55b0476035b1132e40887bf1a4af05fbeac7e8a8e765cc821719c26b231549be4e64338d1810a1b39ad914479d18262690f04d0585a51c04cf41a28864bb71553c8ac81a7e77ad0fffbc5749a0f5a6e575b4372c424d32ea7450c7e463cc4be8e570df1c53f4275bf0f9f4a91e4bee08c8daf43bcb4d293b586079d9fe2c6e2bedc8bb5ebea9583028b93336cb55bc157b16a5a56983075deaac908b8ace8508f45545ca1d4c6429a68bad28d8f0f947e4819ddf17cd4c923e16e032d69dbd6d4cf1c4c4984d4ff21702d424a026fc47fdb95f96b4a8d6fe6617ee0b7d98af0e65f6499bd415c796c8d8efdd952388b3fc183fb40fac273f30748ee202a67272564faefbfe8c953a53166430938fae70fab92ca69ae0d2a962bf2982011478e96589bfb43264e9d4cb6ce80f37ae809429cd31766144755efb22931eb1bde789278d447a188a0c1adb887a2eb43174bd9e82b81c24863f3cd5b23ea6338398a21142a45a9864d7c660680440159f0c915456e25cdbada34fcdaa92a5b8bff698ff536f3fe2967da17e7c4e0de92f1e9cdc8a46e28784059d9aaa1a15ab4cbe25dcd2542f857265b2316b2a7aacebf5a9d3e0d30806bb547cc44e55464fe316f49eccddbc9ede9c48c8bf69c4b45915c22e27da05d1792ce30161b5e9c26d339ebe5d8a4cf6cd5b9b37a80d0431f1802975d41216c4201c05e6a2ad969aa2178ce7a4465bd1372cd17018cf85baef25d74da641fad823ddf3523c5f734d8fdc3f9c95951621537452211be39e25fe7be6d525a5b5d112a3ab5dcfff9808fe98c9247446e0f5b94243fb09edd207da017afdd354dbea9bd975a0b1ccb144eeafca7dd5f2fdcd47a48fc541b3e355398f7369f9fb8bc064f6fed032d337655f5d5b0587e40a7d8d514e28d1e23fbdeee697894c68e4d50e9b4ce310f4a2c96a845b2794a4c55a2483f559e1f3cb0b523223da13fea66cb86cea13095f9e36e8d4eb1ab2fd270c3e174576b8f763922dfbefcf830898f9c809e4b9328957e11274f38ad97688bf39b945ac4498813f7e82aea55402f3dffe1b3647d82387d2c70a747ecbae3f532849c28193cb769783f9fc1e85735e192dc96ae8505b9613785c62d9127aea382815e4f62660ffaa49d7d9e8fc3c59bef841da6a1f276126c50cd1ed2eb189dba8a96c843dad94bb91a284d16438468d2ce882c889fbf0788a4c57ca9ccf43587fd63c9c14e26030f36faa839a7c8ddeaff1073efed3c4f7de12e4fd29ae2df0ba49b25bc8320ad5e5f3771846fe455ef2dc5c60bbf093eda5680e14cdc6716ed12976c55d4fa8e43e1812dddfa0c94b896159b79898274e93f453767e6e870b448edd421759653d438a29420d1fc8d4af8de4e0096eb02388b6eb432eb2fb3f77698850f74072770faf418dd1cc0e0cb4c743ffb65a43ddfd945f810983887635b05ca16242d073d870de5551d3b4fab7a51e10e6ea1b59be7888c8ec42123cb566821a42250fef393a7a9aa3185c53650b2756bc10236cddd88637734923171a93897267135962a6ee82b5ff3585a9e7be901f21d44836d31e9a3917b0097db9fe68ab880fa6efae619a0e1c97976736733868eb883ff01d22fc4028a0ade152f22223228cf9c373b4f80a92df8f30945597825b504b096ebf17eb5f27f40e9136c7665e9e087dff2055d169a9a11d4856ca28921e9497940895e8d0cd7e10e01926ab6b8bfd60de176e4d620a3efbf2335f00255ebec48a9e9fa126178d5635fda6b6d2391c9f0a104037ac1387f9dac45ca9559a09ecfb5ad6e62297162280ba2135e371559610217e737faff040d31fc355f10089c948b38b915278efe3120d1bc7085a7c39559e480bd1754bda36aa1fc4a3aa1612643cc554112bc7861caaa76bef3d4fa1ff8c8dea3a7719113250db51a5fef6106d2b6d4e543e98ade3ba3023ea987bcc30df2d1fac75d9274714d6b8f71e232f3c114aac78f6cfcf8d2b796ec9eb2279c7e71bf87c726fa6232d5c314a83b3bec0559226cc1cab37ea00d9d53fe01bdcbbe3808c2395b510f7140f51624f0682ba56eaf2a0bd0220e384e2ef1b025f87f73e9c20656eac1e11f758157f2083cb83c30487fb8ffae935b49f27422024a4b801a6d6af6b667022925e62a77626c20718351dfe2d7269134189b9f90e8e47f51e38a686fbd2af93ea71c9de0acfe98a63a7ecd206ab34cfa061eaaf663ddd5361f598a12b5d9f60f6ed1535b87e04f040e176beccb4b333befb0705161115c1a5ba97101f388c4d50aa6db6231b4d464f0d876db2ed4ed18ef24da47662ce814b70bf220929405301cb270df5f22a44b9a80951cea29e9dc92f28edf70d5c59a6abfdc4d55a24daa472257efd5800524e1e9f319f998a39bcafc354a3f66aad430b915c41c692e67a100bb97826eeeb562ca84c2d136f0f5fcf8751192eb4f44465078a482448941bedde674af26cbaf37eb4d1134fff10341a7aa278f3f7707bcda7677ac08f4edd36ea778d398353dffd060e937a07b6f9f8acf0afe425e26cf9aec7af3acabfed6a2bc88d9612409af70973f51cc2b8ba95dd45cb7b9df0f8a109f700f2ad682eb087396e2ac87be3031bb03e71838d07bdcf5e4257882530788d8a46b68f77806850a11ef31c60989bed3e2641b9467e968ddf0bc92b6eb4c28d375e03c06e94d4f34e3e3fab721cecc33801fc3b4d6ed8d3718a2f47c88cc5798e9d98e938ad8dc2c2f40961892efabd299c5b66df82005162ce9f479ce03849065ab0cbdb151e45b24ab463861a916fdff4ffba5d26adfaa4254457ce1865d92e25545a73e618b6a574385ac63ef0edfe5a07b1640d8ab7b999c4ba53c6ebfb2740b9732c7c65650e5637b45d129299c402a2aa9018a276da8369e576e45c10abb3a4612bb64b5aec0732ae7cdd5f9a5bd9d02e4f92cc752e18159d40dccb6c6810132eba00d0050dc986ff5105709c99e1fa3851f745f2b75e02d2ca22c9b28726be9415db7a653585145e905a5e76bb0cafd9c1014a515f2f56f82a994f12e900d5d5a3b83874989ee5538f16a1a493e282d370c08f84698c1b830d77b58dee85915d323a840e9bff8f1f88aa0384463350dca823b492e8e409db1743c61acc5218a8c779efb6847e1bd596aa77960bf3a9824acd52c2cc151945af06d9c378f94542bc184dbbf0a65f99116611c797c0b3e223a31ef6ada2c08201622cc5b3588ee265d632f9b511aa270872562d8ac0caf32fdc3fca08f4b0d4f758b3feeb9aa58924a0246bfef172453b938c983dbf12b3b0eb4d9c741abc26f2d1d4e9d28012644a3d6133b01084c080cf919c8fa81f2352c48b828df1c1076b2ebce8176a71390598e1cd7fe0e156b2b728c855f12e659e1e886b0519aaf6cb9a091625e5c75fb72b2d02def531a7832192b31805c39e9039957e30043ce64c301098b5968ffaf23147c8e284548776108365cc50091e64eff9e250f377a45001378dcafcb2d86d008455a1dc007a73a330f4410e1b5f176e07cec25da98a9a5927aef41fb408272fc0a0f10bc09b628bca11c5653492b184fbbf361ffe1825d6efa06520a9ec9fb165d1eab70459b10c2f46520ecf6e646637a5c84459370740cb6c884b8c96084e21e214cd5846ff98c883f3db44f2afd2aac8813359406da16caabd92199699c991e310ac658265e3cfd343ea317671c4e52acd84dae8977ccac8dd391b4bafc83989d8b5b61e2a0dc880eaba150151b80fbc50d9d6584b0ec7c48bfa525a2bd979746247b827c41b3464eff61406f273905b2ae49282844e9e0ad33b248d9f604e9347c7039dfbccccba7aafcee1f24823ff26e5672eaa3fc30a8c7af42ef9ef453f676552180eae87e28a7ad683d9a751e384f8d42b13b2b61a0516e3bf074fd2a06da7a128913bfdcb9176e334d8b6a42a3d0c8ece031819b89766c266cd358387bec53f86c2295b25d3c60d520044444ec5f4921b9d7716eba86aa796e8542ccc13d429ffd18ed6d75021cdd7636b00ee072e03074dd95c318d392df11afd8e9b6ee0dc7aa68f78f47b61843d39a8b04f85e12e66e482a9732bc2dc975cb4ce9a3c77bbe35afdaa5589a83c4b17df82328e999abd76de0ca41b904339b17613febdc32f11ebd7a70583aeae03356975ed8f2e7eaaf9990516e4f25a5e4453a7507bafb5135215eb1da2e26e87522ae2cc9508ce7ecca8a4d424fbd8d47ad405a3e0084c19e5d2f8190bbad0923d724a5a49025c1db207c4add841ca8daf06aa20d8c690675cb665de2fd8a573f89cce12b49a9ded68b1c4a3521171e566207f86be8193f4ee868dd618a0853746c727d47b36799f87f9a72622969e6a5294a9e62ac66f05bece7b57f9b3c9cef4e012ef19cd5eb449093ddae71439f4f7240c01e9c7b9659317eb21a6b1cbdf8606acc4bb6d08f241962fee25254e13eeaf8aab069a3aef6313d8fb71fb21310d845a86ee95bec324265a2291063e348939b1a6ffe6e08a463f61f08f5082f30c6c4ea53207139cb3588264a79d3547dcd74c9689f4a0d49eb96c48f12678dc13397e74e556884c901cdec856ce3e0e4f8bb4cb724b16f87c85299f9e39fd3a8c8a90568db6508728bd9784135e04fc7bb6f6bc92012a1038e66ca493ec58bd014f61c5156b4924a5eab14919445644d4373005d9b83889aa256c4f532103642d8a2fa67c15b03e34b1910a411cdf7f169c068f39cd4e884e0fec3190f92a7801a4783edf0ef172b874e8706edd72d10ed7908096baf5eff046d4cf41da4902ab9b5e390e7885cc8dbcd0828869289915098e6b89fae3cb1bacbc03a422775e6832ee409f98b5c85689ff7166298219953a507e6b188590420afdaa446edda19f9a17c8c502fe2e53a270ef29ad51ade09b07bd860e71ba1c3c5cfdd62bda6ee09d26d277b86b9567483c981bcdcdc590e1d3baec9149e33a3a626860831945ddd1be33650d089dc68929352fd163bea0a0894e29bcd84c5ecfc32b22c1614a55e19475db10bc23b93dfd51a6fe3a9d10b8afdd74ca8eab3a90f8643b77dba86fc703d51ea826f5225f09813b2bf57e48233e0fbeb83f96013ccaacc521af1cf150e65f8195db008002bdb4736b86c97ebbd550f57"}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000002200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x6611, 0x0) [ 237.560267] bond0: Enslaving bond_slave_0 as an active interface with an up link 05:45:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x6) r2 = socket$inet(0x2, 0x2, 0x6) setsockopt$inet_tcp_int(r2, 0x6, 0x16, &(0x7f00000004c0)=0x400000000010001, 0x4) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) setfsuid(0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000480)={0x1, 0x53}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x16, 0x0, &(0x7f0000000300)) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000003c0)={0x0, 0x0, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000440)={r4, 0x80000, 0xffffffffffffffff}) fsetxattr$security_selinux(r0, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:getty_etc_t:s0\x00', 0x21, 0x2) futex(&(0x7f0000000000)=0x2, 0x8c, 0x0, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000180)=0x2, 0x2) syz_open_dev$cec(&(0x7f0000000580)='/dev/cec#\x00', 0x3, 0x2) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) write(r5, &(0x7f0000000600)="3e80d8850bbb603e6fcb74190dc288818e080facc4e941c28da676c4c9f5925a2ade2b40d53be52840e044d57e437dd4952c19e227ad0a215e415d406028cb6fb66bc27d6e07bc87ba0f453d7b4aa9e8e6b50e818087156f96f4240d6a800f75e9a28b02521a9bd157e3f27bf07910f7023e49a7a164af63e16c15c80b98e91e132f8d9bdfe5a1c600c3fbea49a72b7fbfcbbd7c6227afe58a8b1a9d825569405aa59d3cad62b9679073ea16", 0xac) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000280)) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000001c0)={@ipv4={[], [], @local}, 0x0, 0x2, 0xff, 0xb, 0x162, 0x7}, 0x20) socket$inet_tcp(0x2, 0x1, 0x0) [ 237.606585] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 237.622406] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.646163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.671412] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.690517] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.704809] team0: Port device team_slave_0 added [ 237.712588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 05:45:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0xf, 0x4, 0x4, 0x8, 0x12}, 0x2c) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x1000}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r1, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000240)={0x3, &(0x7f0000000080)=[{}, {}, {}]}) ioctl$KDMKTONE(r0, 0x4b30, 0x100000000) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000380)) ioctl$VT_WAITACTIVE(r0, 0x5607) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x40600, 0x2) [ 237.729951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.748409] 8021q: adding VLAN 0 to HW filter on device team0 05:45:49 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}, 0x9, {0x2, 0x80}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc0a85352, &(0x7f0000000100)={{0x0, 0x893}}) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000200), &(0x7f0000000280)=0x4) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 237.785539] 8021q: adding VLAN 0 to HW filter on device team0 [ 237.802936] team0: Port device team_slave_1 added [ 237.810670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.817586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.828992] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.836882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.844603] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.850984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.858032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.865820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.873456] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.879834] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.886597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 237.894463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 237.902500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 237.910315] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.917787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.924657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.931963] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.957658] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 237.965569] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.976735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.984762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.992797] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.000325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.007641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.015409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.023281] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.029663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.036755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.043958] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.050756] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.057559] device bridge_slave_0 entered promiscuous mode [ 238.067678] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.074185] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.082608] device bridge_slave_1 entered promiscuous mode [ 238.100941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.108865] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 238.160992] device hsr_slave_0 entered promiscuous mode [ 238.189550] device hsr_slave_1 entered promiscuous mode [ 238.261630] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.269752] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.277319] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.283720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.291056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.298716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.306507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.314017] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.320409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.327204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.334959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.342594] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.348915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.355893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.363768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.383193] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.404031] team0: Port device team_slave_0 added [ 238.410287] team0: Port device team_slave_1 added [ 238.425743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.432928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.441068] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.448647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.456583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.464903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.473128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 238.481166] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.488658] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.495753] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.551136] device hsr_slave_0 entered promiscuous mode [ 238.589695] device hsr_slave_1 entered promiscuous mode [ 238.629626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.637141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.648422] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 238.660052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 05:45:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x4000000002, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4000) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000200)={0x2, 0x4e20, @rand_addr=0x2}, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002b00812de45ae087185082cf0124b0eba06ec44102000000000000110f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000240)='./file0\x00', 0x1000, 0x81) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0x7, 0x5, 0x401}) [ 238.673491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.681794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.691306] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 238.700383] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.721569] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.739694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 238.747143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.779183] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 238.795886] hrtimer: interrupt took 26877 ns [ 238.805435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 238.817965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.832966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 05:45:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x4000000002, 0x10) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4000) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000200)={0x2, 0x4e20, @rand_addr=0x2}, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002b00812de45ae087185082cf0124b0eba06ec44102000000000000110f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) mknodat(r2, &(0x7f0000000240)='./file0\x00', 0x1000, 0x81) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0x7, 0x5, 0x401}) [ 238.894297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.908216] 8021q: adding VLAN 0 to HW filter on device batadv0 05:45:50 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fstat(0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x0) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) [ 238.962996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.989684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.996724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.043548] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.081773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.098801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.122559] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.128952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.150402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.158933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.166702] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.173085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.186208] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.202252] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.217505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.225509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.233072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.240519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.256537] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 239.266676] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 239.293988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.302012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.310752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.318344] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.326329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.334661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.342312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.349988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.357276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.365335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.373116] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.379490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.386457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.394563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.402235] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.408580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.415819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.423644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.431698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.439359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.447640] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.454925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.461886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.469024] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.479520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.491710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.506502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.514103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.534261] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.545232] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.555874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.568765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.617247] 8021q: adding VLAN 0 to HW filter on device batadv0 05:45:51 executing program 1: ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x9e6b2e38e5bc3069) pipe(&(0x7f0000003600)={0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000003680)={0x5, &(0x7f0000003640)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f00000037c0)={r1, &(0x7f00000036c0)=""/224}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) sendmmsg(r2, &(0x7f0000000400), 0x0, 0x20004000) write$binfmt_script(r3, &(0x7f0000003800)=ANY=[@ANYBLOB="bd0420742f66696c6530909219bd3131eb508f3ac17fe574067e7c056985a21874919a7bd4e18a289238213a54dd13978a"], 0xa) close(r3) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)) ptrace(0x8, 0x0) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) read(r2, &(0x7f0000003540)=""/172, 0xac) r4 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x4, 0x40) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) ioctl$BLKFLSBUF(r4, 0x1261, &(0x7f0000000040)=0xfffffffffffffa82) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f0000000300)) r5 = syz_open_dev$video(0x0, 0x3, 0x0) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000340)={0x3, "894a3c0ac3994078d6576f9a2f809db6730510a8c833971b866bde73e82613e1"}) recvmmsg(r3, &(0x7f0000003300)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/220, 0xdc}, {&(0x7f0000000580)=""/129, 0x81}, {&(0x7f0000000640)=""/209, 0xd1}, {&(0x7f00000003c0)=""/98, 0x62}, {&(0x7f00000000c0)=""/53, 0x35}], 0x5, &(0x7f00000007c0)=""/170, 0xaa}, 0x1}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000880)=""/156, 0x9c}], 0x1}, 0x40}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000940)=""/4, 0x4}, {&(0x7f0000000980)=""/41, 0x29}, {&(0x7f00000009c0)=""/40, 0x28}, {&(0x7f0000000a00)=""/82, 0x52}], 0x4}, 0x100000000}, {{&(0x7f0000000ac0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000b40)=""/201, 0xc9}, {&(0x7f0000000c40)=""/196, 0xc4}, {&(0x7f0000000d40)=""/57, 0x39}, {&(0x7f0000000d80)=""/62, 0x3e}, {&(0x7f0000000dc0)=""/207, 0xcf}, {&(0x7f0000000ec0)=""/54, 0x36}, {&(0x7f0000000f00)=""/28, 0x1c}, {&(0x7f0000000f40)=""/27, 0x1b}], 0x8, &(0x7f0000001000)=""/227, 0xe3}, 0x100}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001100)=""/56, 0x38}, {&(0x7f0000001140)=""/131, 0x83}, {&(0x7f0000001200)=""/59, 0x3b}, {&(0x7f0000001240)=""/134, 0x86}, {&(0x7f0000001300)=""/211, 0xd3}, {&(0x7f0000001400)=""/49, 0x31}], 0x6}, 0x2}, {{&(0x7f00000014c0)=@generic, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001540)=""/174, 0xae}, {&(0x7f0000001600)=""/178, 0xb2}, {&(0x7f00000016c0)=""/168, 0xa8}, {&(0x7f0000001780)=""/31, 0x1f}, {&(0x7f00000017c0)=""/194, 0xc2}, {&(0x7f00000018c0)=""/252, 0xfc}, {&(0x7f00000019c0)=""/132, 0x84}, {&(0x7f0000001a80)=""/161, 0xa1}, {&(0x7f0000001b40)=""/180, 0xb4}], 0x9, &(0x7f0000001cc0)=""/213, 0xd5}, 0x8000}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001dc0)=""/203, 0xcb}, {&(0x7f0000001ec0)=""/70, 0x46}], 0x2, &(0x7f0000001f80)=""/44, 0x2c}, 0x400}, {{&(0x7f0000001fc0)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000003200)=[{&(0x7f0000002040)=""/15, 0xf}, {&(0x7f0000002080)=""/4096, 0x1000}, {&(0x7f0000003080)=""/203, 0xcb}, {&(0x7f0000003180)=""/65, 0x41}], 0x4, &(0x7f0000003240)=""/153, 0x99}, 0x9}], 0x8, 0x40000000, &(0x7f0000003500)={0x77359400}) 05:45:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400, 0x0) accept$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000000c0)=0x1c) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="24000000240007011dfffd940101830020200a000900000006000000000000000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) 05:45:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x80000000003000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x10, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x5, 0x10080) ioctl$VT_SETMODE(r3, 0x5602, &(0x7f0000000100)={0x1ffe0000000, 0x8001, 0x7, 0x7, 0x7}) 05:45:51 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001800)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000001940)={0xc2, &(0x7f0000001840)=""/194}) recvmsg(r0, &(0x7f0000001580)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000080)=""/205, 0xcd}, {&(0x7f0000000300)=""/248, 0xf8}, {&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f00000004c0)=""/81, 0x51}], 0x4, &(0x7f0000000580)=""/4096, 0x1000}, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0}, &(0x7f0000001640)=0xc) r4 = syz_open_dev$vcsa(&(0x7f0000001740)='/dev/vcsa#\x00', 0x2, 0x200001) sendmsg$nl_netfilter(r2, &(0x7f0000001700)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x1c, 0x4, 0x7, 0x300, 0x70bd2d, 0x25dfdbfe, {0x2, 0x0, 0x5}, [@typed={0x8, 0x50, @uid=r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x14, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x310) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 05:45:51 executing program 2: r0 = socket$inet(0x15, 0x3, 0x8ae2) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]}, 0x8000000000800) 05:45:51 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0xa8400, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x8000000000000005, 0x1, 0x4, 0x6, 0x0, r0, 0x800}, 0xfffffffffffffea0) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000000180)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x2}, 0x2c) r3 = socket$netlink(0x10, 0x3, 0x7) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001e00)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000001dc0)='\xc4GPL\x00', 0xffffffffffffffff}, 0x16d) fcntl$getownex(r2, 0x10, &(0x7f0000001440)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001480)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000001580)=0xe8) fcntl$getownex(r3, 0x10, &(0x7f0000001c40)={0x0, 0x0}) getresuid(&(0x7f0000001c80), &(0x7f0000001cc0)=0x0, &(0x7f0000001d00)) r10 = getegid() sendmsg$netlink(r0, &(0x7f0000001d80)={&(0x7f0000000140), 0xc, &(0x7f0000001c00)=[{&(0x7f0000000240)={0x1164, 0x36, 0x1, 0x70bd27, 0x25dfdbfd, "", [@nested={0x1148, 0x20, [@generic, @generic="74125edab8b80ddcd1206b6433856eed5470a87a6e3fee7a4b689241a0cf8b619031b362d72761b69dfd0b7b6754dd25218991075093c194acdb28e5d1ed5791309c0f0fe44f544319835ec29c0f5a5c723b3f8322ce10b1615dc8b53b9b26453752b63baf7689b3b8c3806e24e6281d71d30b15579a83a874e1f638e9c9dde478b936ffaa09bc0ecd243200f972956d9186e70ab2275228", @typed={0x8, 0x73, @str='\x00'}, @generic="c4a0459efc303ef265ccaf73e5be83514873648d9931288f4382014a4b607eec5fe12941c5d41167fd259651e2b357b885628f92cd1972ba0551e340fc6175102f02888e64cb2ac528eef2e4e0fb9a978d0747d1e69ba5c688098d65ff88fb0577d33b2a4d05abc9fba80eae40dc0abb48f930678a4753f721dcdb61d6969748a8240b6db3daf5078a5e69bb", @typed={0x1004, 0x92, @binary="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"}, @typed={0xc, 0x5c, @u64=0x9}, @typed={0x8, 0xb, @uid=r4}]}, @typed={0x4, 0x35}, @typed={0x8, 0x10001, @fd=r1}]}, 0x1164}, {&(0x7f00000015c0)={0x2b0, 0x21, 0x200, 0x70bd2a, 0x25dfdbff, "", [@typed={0x14, 0x4c, @ipv6=@mcast1}, @generic="d5239019bd47f1c7c3bad2cfbff1e306f14b6802f1d3c1dacc256f11f05d7fe915eb36a1b9bbe75e012704914dc0b43b37029daa4f95e2408a6f26053274bae508a090ab647d9a12164e2412948bc80d4f460066aef8d93511045c06934cb1f3", @nested={0x14c, 0x26, [@typed={0x8, 0x17, @pid=r5}, @generic="db2f7dfccad91beec51586d6c36290aa3ab0baebebc31e5c4fab7dd5d23411170a754de3431485182535b8a1857aca0783a9e29efed623", @typed={0x8, 0x87, @pid=r6}, @generic="a05a039868fe744850b67a7935f4d0812ad488caccd2eb06cbd3c69dcc6bb75c3723330e1a9b32230eb96e40b536d9aaa3d665ffd7a685cd1fe8782761967edd1301b3cfa1f62225fcdf94c33837b25841189d7749177c4f7ca8bd0d93916505d8e403bb95f8f3e37134e46d396d4c0b7ef3cf58a4b0d84e89fd6cd330fb5e6dffea9427f79ca01a4ce98207dd5300f5ac434371121c0bcdffdf35045ec5417bb7aacc417a7a7c55bb35821f47d9d160b5ba5c383366e67a31e051318ce79ff3171114ad0bc6f90d3c62d2a1e2bfcec7cc048f0cb65078e0e2ebd01dc99644eeae98b6581ea812a9aad32c5bae4c3e19b0", @typed={0x4, 0x30}, @typed={0x8, 0x93, @uid=r7}, @generic="e88f08"]}, @nested={0xe0, 0x87, [@generic="6671d874207d9b7a853b8d5e17ce20d6963352b5ca4498e3d962f1197ef57193f2e899ceb09e856daeb58acbdaa47d9a4bc5b447f8319503e1da8a4e02214d55e98743cfdce250555ae4cdc5d20a07fd532a93fc46b78a2b7370c93290efb73b32ec322fdab6ba96098cfd9936ff6d3e7f0cbbdc0b456b76a46acc823a1737a20914d75ef8353b687facf110a13e22aff33e4efbc8d1", @generic="fb71423e2f9732f39698cc4d231909125945be2fc1d2ac4d3c96873949a599f2aa328f7dbe5086504bdde0cbdb1ca4964eb8be2673a7ff90dfbe3575157c760eeb9b4a78ae"]}]}, 0x2b0}, {&(0x7f0000001880)={0x378, 0x29, 0x101, 0x70bd25, 0x25dfdbfb, "", [@generic="1da0201952de99e45d30f78919e0a11ce03be0f8c95f3a785b5ea4b0d38da3ec438750775bf57f43e430bed7f2767565e489f3d2490684e1f606414554d9726acdef88d0c3fe67eee8a55e14a0edb80c45be6703eafcec887df2873312c03ed7fece6a62468f30b14190b2aab7504eba0f0033e2a957b1b92e89dd2ef938a4f0d84ed379828e82f2f3e6754047aac9070fedbc61b3cb345c631d26f40e788ffcfebc42cb20755b3493846fae115f929061958261751ab5a92ca62f40379f25ac42e9dacaab5cc1a5c0a912c4811c15c8cb0388ad0d55", @typed={0x18, 0x51, @str='$\'|vboxnet0cgroup)\x00'}, @generic="afa54f84b9c5cc3f78d2c176afd71f8ad3b455611ad4c4cb38d6727186ac8d080424e5c82de03691bb613adc20949dd5e5ee6103aabf83d74761d759bbb127cdbd30f7338758fe5e9899469ce94e69dff248ff58c20172dccd1986644612cd4c898614365329e4badee49e64822715dc095554e8567229b398affa296892a35a0fa71b4b433653deb1d16816066743f96382ac93836aa52047050e85705c7d41e8968d9c93504bdeca9eb10925182a28f030fc0cccba90fb03f9554ce9ccfec6145e664d927fc2906f391b0b2341a7c6dc2fae751e32671ff42035", @nested={0x194, 0x34, [@generic="9f29fbbde875d54212fcac2c63f6adbf1fec5c493c0a8dddcecb5aac33dc2e8b12b08f6afc250dae9a94", @generic="fbd2f55c5379c2785b685a0aaf079105dcb166b1a59714f21707d5644c2e77cce5580d9e6c07d0ddb0ea0b30e84e93fc3bf4d5f5514736f032215afefa7a602aef38fbcc421358f8a5db91374e178acc8f2edfa292f61ff82049a343c5d6a367b5533465c5b2a844d9dddd86ba8cdde3f8d59afa7a2bf4", @generic="4dc26132011e91b128c047b1fad7edf8fc6d843fb75c1efe50592ef00a0376745802dc56888346a8d90eb2e1b49b9e92a30ab15c02f13be3ca88fb5d498885fd2a5db070cbafb407a27ff5731890ccc551ca84f4d6685366f7813b9877aeb814f312e6822bd4c52b34185c8baf", @typed={0x4, 0x52}, @generic="bf983f21623d796c0bc66c902194120484b2ce3a54c9d542109ca815df371e241e3a0028041c7389ae1ba47c693a52a4698938f4e0528d74314db649a116feb518c00d7328ac84f8cef2b4d8173c3463324587f635aea0c9e5e3b4053a4415d5cea87cfa1b0a036cebe763f2abda6869907fccd7ab47eabb6b959589c5"]}, @typed={0x8, 0x6b, @ipv4=@remote}]}, 0x378}], 0x3, &(0x7f0000001d40)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r3]}], 0x38, 0x4000000}, 0x800) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000000)) r11 = dup3(r2, r2, 0x80000) ioctl$sock_inet_udp_SIOCINQ(r11, 0x541b, &(0x7f0000000080)) setsockopt$netlink_NETLINK_PKTINFO(r11, 0x10e, 0x3, &(0x7f00000000c0)=0x7, 0x4) 05:45:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000540)={0xe6fa, 0x33c1f5e5, 0x3ff, 0xca, [], [], [], 0x6, 0x8000, 0x7ff, 0x9, "d489e7aa99db08a27a2c8362cf7dbbb5"}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) setsockopt$sock_void(r2, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r2, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000480)={0x7, 0x3, 0x0, "e3335fcf4b478b75fdc3be0b8901cc453822463c14655216d52bb4f276d18996cf9f7a7d40da3438edb6407fe3d0a11037934daa2c54ffac9cd4cd4f", 0x29, "0d96d24a0c72bf62c1f06f23a126b86ed3d9aee186534add1e75ab10c585a34d738d6d4a3860b5dfb6c6804c5ddff13a813ebefa4963d980d169fdd3", 0x20}) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x3f, &(0x7f0000000140)=0x2b318b58, 0x4) [ 240.014916] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 240.022298] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 05:45:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000040)=0x800) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup\x00', 0x200002, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x9, 0x800) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000300)=ANY=[@ANYBLOB="6cdd715e2d6262e7ac4555e3f2ae480a8c265af06e7b7a86ea3c0000000000000000000000000000000000000000000000"], 0x0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r3, 0x3) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000140)={0x7, 0x0, 0x6, {0x5, 0x76b, 0x0, 0x40}}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000580)={0x0, 0x5, 0x0, 0x401, 0x400, 0x2}, &(0x7f00000005c0)=0x14) fchdir(r1) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) 05:45:51 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001800)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000001940)={0xc2, &(0x7f0000001840)=""/194}) recvmsg(r0, &(0x7f0000001580)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000080)=""/205, 0xcd}, {&(0x7f0000000300)=""/248, 0xf8}, {&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f00000004c0)=""/81, 0x51}], 0x4, &(0x7f0000000580)=""/4096, 0x1000}, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0}, &(0x7f0000001640)=0xc) r4 = syz_open_dev$vcsa(&(0x7f0000001740)='/dev/vcsa#\x00', 0x2, 0x200001) sendmsg$nl_netfilter(r2, &(0x7f0000001700)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x1c, 0x4, 0x7, 0x300, 0x70bd2d, 0x25dfdbfe, {0x2, 0x0, 0x5}, [@typed={0x8, 0x50, @uid=r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x14, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004865e001c000000000000000000000000000000000000000000000000000000000000000000000104000000000000000000000000000000000000000000000000008a0300009330de4288142fbdb29d6abfd27132edeb747caadb49fcaa4301584da231ae24bfcf41ee5ca2bcd6303af6575eca990a30aaff31b91c1ba90e92f33cd600982de2251b3390be8f59171fa7736338b16090be3d375c29e8d11deb41af214d451a18eb7bc18f80a2b445c3c06cc26805ad100dea4a8870cbcc70b91d8d6310848620718cc4e172b31480fd1b7dd76f5f8a67250119b63756c2059be0cf20851f33cc7e689ef5f17f41c401283c0c96e277962902"], 0x310) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 05:45:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) preadv(r3, &(0x7f0000000300)=[{&(0x7f0000000740)=""/4096, 0x1000}], 0x1, 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x479, &(0x7f0000000080)=0x0) io_submit(r4, 0x7, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200000}]) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000040)=0x2) 05:45:51 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) bind(r0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) write$P9_RGETLOCK(r1, &(0x7f0000000080)={0x1e, 0x37, 0x1, {0x1, 0x1349, 0x691, r2}}, 0x1e) 05:45:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x3ff, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, &(0x7f00000003c0)=""/186}, 0x18) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80382, 0x0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000080)={0x3ff, 0x49, 0x80000001}) getpeername$packet(r1, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000005000000000100181f0000", @ANYRES32=r0, @ANYBLOB="0000000000000000db05ffffffffffff776bffff080000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0xff, 0x49, &(0x7f0000000140)=""/73, 0x0, 0x1, [], r2, 0x8}, 0x48) [ 240.340043] Unknown ioctl 1082938942 05:45:51 executing program 4: socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd95}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], 0x4924ca3, 0x0) 05:45:51 executing program 0: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x0, 0x0) io_cancel(0x0, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RGETLOCK(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x0) r4 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) dup2(r4, r3) r5 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffffffe, 0x400000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) ioctl$sock_SIOCGIFCONF(r4, 0x8912, &(0x7f0000000580)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000005c0)) accept$packet(r1, 0x0, &(0x7f0000000880)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@multicast2, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000e00)={{{@in6=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000f00)=0xe8) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000001500)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f00000024c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, 0x0, &(0x7f0000002600)) accept$packet(r3, &(0x7f0000002780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000027c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000002c80)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000004100)={'vlan0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000004440)) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000007040)={{{@in=@remote, @in6=@loopback}}, {{}, 0x0, @in6=@local}}, &(0x7f0000005f40)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r5, 0x0, 0x50) 05:45:51 executing program 4: mkdir(&(0x7f00000013c0)='./file2\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) clock_gettime(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getegid() getsockname(r1, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000280)=0x80) chdir(0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x50) 05:45:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r1) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="c9e78a37f81cdca0ffcab97181f582ef0f4763fd09e95d785a7c14e3c95083e6d740c2942ba1c352b5eb0b1cce882792b7db405f909221a5ad7880c392cd9b5928db2baefdf53090e7eed9aa345aa1a4bcdfe5840ba4248bfdb60adad66baa8b8f4cd103c9cf2cf21fa2bd63ba4e40f6157c6d23c38f0356ef01"], 0x18}, 0x0) setrlimit(0x7, &(0x7f0000000140)={0x6, 0x1f}) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x1, 0x0, 0x0) 05:45:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x35, &(0x7f000002eff0)={0x149, &(0x7f0000000000)=[{}]}, 0x10) 05:45:52 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x25, 0x3, 0x0, {0x0, 0x4, 0x0, 'proc'}}, 0x25) [ 240.956840] overlayfs: filesystem on './file0' not supported as upperdir 05:45:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000540)={0xe6fa, 0x33c1f5e5, 0x3ff, 0xca, [], [], [], 0x6, 0x8000, 0x7ff, 0x9, "d489e7aa99db08a27a2c8362cf7dbbb5"}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) setsockopt$sock_void(r2, 0x1, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r2, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000480)={0x7, 0x3, 0x0, "e3335fcf4b478b75fdc3be0b8901cc453822463c14655216d52bb4f276d18996cf9f7a7d40da3438edb6407fe3d0a11037934daa2c54ffac9cd4cd4f", 0x29, "0d96d24a0c72bf62c1f06f23a126b86ed3d9aee186534add1e75ab10c585a34d738d6d4a3860b5dfb6c6804c5ddff13a813ebefa4963d980d169fdd3", 0x20}) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x3f, &(0x7f0000000140)=0x2b318b58, 0x4) 05:45:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000d00)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x8400ae8e, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r1, r2) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000000)={0x1, 0x0, {0x100000000, 0x20, 0x5, 0x7f}}) 05:45:52 executing program 5: syz_open_dev$amidi(0x0, 0x7bf, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x800, 0x0) syncfs(0xffffffffffffffff) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000e95000/0x3000)=nil, &(0x7f0000fbc000/0x1000)=nil, &(0x7f0000f59000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000569000/0x1000)=nil, &(0x7f0000390000/0x2000)=nil, &(0x7f00001a2000/0x4000)=nil, &(0x7f0000e1d000/0x4000)=nil, &(0x7f0000b4a000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)="524ffffd311b361c35bd8e3366f27ab6ff8950fe7492d32d6e70d4a7ba350baa2cfa90abd410572a8e034069bde878a0102c922bccd8771dfca67251ec5035672b8dc6d9da4fb4aabf83a7c28079159d", 0x50}, 0x68) set_mempolicy(0x4003, &(0x7f0000000140)=0x6, 0x9) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r4, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000fffffff4, 0x0, 0x8, 0x1, 0x90030000000000, r2, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000001c0)={0x8, 0x0, 0x100}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) fchown(r3, 0x0, 0x0) r5 = inotify_init() fcntl$dupfd(r1, 0x406, r2) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x4000082) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:45:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x800, 0x0) write$FUSE_IOCTL(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x20000000000003, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0}) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="0400000012000103000000000000000000000000d613721234909de29e7960a1f8477bfbcf1524fc078075f0b1dcebbacd330bedb085a0227a9b716c687d69fd02bae94be75495008b828698b7a389e159f1f1ba30f5b025fd10c1771f5805ec56e31b8a92d929edc1433d0545f85ee6bda4720d07b6eeb8c595c0f05419f3e207832f5398d1d5aa207dd63ccd31679ba9e8aa5f7abaa052c76ea5ffababdb2c9f846d92311deb46b8fa1108dd53ff7d0295cdaa81ef2ec9d4d797f76d24521c99ab28fcc0a38fb4be428e8b2206193b26de"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001cc0), 0x4000000000009a0, 0x1013e, &(0x7f0000001540)={r1}) r2 = socket$inet6(0xa, 0x3, 0x6) fdatasync(r2) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x20000, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) getpid() ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000000)={r0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="000000004000000254e72d5d34503aa35e678fdf2fd40a37d61c0c7ef4938aaf421a7846819748fd98a8"], 0x1}}, 0x0) mlockall(0x3) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffff, 0x0) r4 = syz_open_procfs(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SIOCX25CALLACCPTAPPRV(r4, 0x89e8) socket$inet6(0xa, 0x6, 0x0) 05:45:52 executing program 4: mkdir(&(0x7f00000013c0)='./file2\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) clock_gettime(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getegid() getsockname(r1, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000280)=0x80) chdir(0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x50) [ 241.221552] Unknown ioctl 1082938942 [ 241.307411] overlayfs: failed to resolve './file0': -2 05:45:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x200000001, 0x20000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b0f, &(0x7f00000004c0)='ip6gre0\x00\xf5\xa3\x81=\xd1\xd8\xd7\x11\xe2;z\x134hH@\r\xe2ue\xebE\aC\xe0\x10`\x80\xce~\xe5\xe4n@\x80\r\x97\xb1\x1f\x9cY\x81\xba9\x1d=') 05:45:52 executing program 4: mkdir(&(0x7f00000013c0)='./file2\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) clock_gettime(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x80, 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getegid() getsockname(r1, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000280)=0x80) chdir(0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x50) 05:45:52 executing program 0: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x3e, &(0x7f0000000040)=[{&(0x7f0000000080)="2f0000000008030007fffd946fa283bc8020000000040005031d856813000900070014cc16ccbb24e0710b42fa3ccc", 0x2f}], 0x1000000000000385}, 0x0) 05:45:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x200000001, 0x20000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b0f, &(0x7f00000004c0)='ip6gre0\x00\xf5\xa3\x81=\xd1\xd8\xd7\x11\xe2;z\x134hH@\r\xe2ue\xebE\aC\xe0\x10`\x80\xce~\xe5\xe4n@\x80\r\x97\xb1\x1f\x9cY\x81\xba9\x1d=') 05:45:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x3, 0x8000000003a) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x200200, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000440)="b10b93", 0x3}], 0x1}, 0x8000) socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="d09a", 0x2}], 0x1}, 0x0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000240)={0x200, 0x9, 0x3, 0x20, &(0x7f00000000c0)=""/32, 0x4a, &(0x7f0000000140)=""/74, 0x73, &(0x7f00000001c0)=""/115}) 05:45:53 executing program 1: r0 = socket$inet(0x10, 0x7, 0x800000800) fcntl$dupfd(r0, 0x406, r0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="240000001e0007041dfffd946f610500070000001f000000000001000800a3a20400ff7e", 0x24}], 0x1}, 0x0) pselect6(0x40, &(0x7f0000000080)={0x2, 0xfffffffffffffff7, 0x51a7, 0x9, 0x7fff, 0x10001, 0x1, 0x8}, &(0x7f0000000100)={0x5, 0x7, 0x5, 0x1a7, 0x5, 0xf8, 0xe915, 0x401}, &(0x7f0000000140)={0xfe, 0x4, 0x2, 0x3, 0x7, 0xffffffff, 0x20, 0x3}, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000240)={&(0x7f0000000200)={0x7}, 0x8}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x800000005, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = eventfd2(0x0, 0x0) read$eventfd(r3, &(0x7f00000006c0), 0xfffffea1) dup3(r1, r3, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x15) write$binfmt_misc(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x6) 05:45:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="300000001800110300000000000000000a000000fe000000000000001400050000000000000001dfff0000000000e200"], 0x30}}, 0x0) 05:45:53 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setsig(r0, 0xa, 0x33) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x4, 0x4) creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000200)) mkdirat(r2, &(0x7f0000000740)='./file0\x00', 0x0) write$FUSE_STATFS(r2, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, 0x0, &(0x7f0000000400)) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000140)={0x3, 0x10000, 0x80000000, 0x6}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8947, 0x0) 05:45:53 executing program 4: r0 = socket$inet(0x15, 0x5, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f00000000c0)=""/113) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000040)) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r2 = getpid() r3 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000140)={r1, r0}) 05:45:53 executing program 5: syz_open_dev$amidi(0x0, 0x7bf, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x800, 0x0) syncfs(0xffffffffffffffff) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000e95000/0x3000)=nil, &(0x7f0000fbc000/0x1000)=nil, &(0x7f0000f59000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000569000/0x1000)=nil, &(0x7f0000390000/0x2000)=nil, &(0x7f00001a2000/0x4000)=nil, &(0x7f0000e1d000/0x4000)=nil, &(0x7f0000b4a000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)="524ffffd311b361c35bd8e3366f27ab6ff8950fe7492d32d6e70d4a7ba350baa2cfa90abd410572a8e034069bde878a0102c922bccd8771dfca67251ec5035672b8dc6d9da4fb4aabf83a7c28079159d", 0x50}, 0x68) set_mempolicy(0x4003, &(0x7f0000000140)=0x6, 0x9) r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) r3 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r4, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000fffffff4, 0x0, 0x8, 0x1, 0x90030000000000, r2, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f00000001c0)={0x8, 0x0, 0x100}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) fchown(r3, 0x0, 0x0) r5 = inotify_init() fcntl$dupfd(r1, 0x406, r2) open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x4000082) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 05:45:53 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)=""/58) sendfile(r1, r1, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x0) 05:45:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000040)=0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) write$cgroup_int(r2, &(0x7f0000000080)=0x3000, 0x297ef) close(r0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, 0x0) 05:45:53 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=@delsa={0x28, 0x11, 0x101, 0x0, 0x0, {@in=@multicast1, 0x0, 0x0, 0x6c}}, 0x28}, 0x8}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r2, 0x410, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x6}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40040) 05:45:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x3}], &(0x7f0000000080)='syzkaller\x00', 0x3, 0xcf, &(0x7f0000000100)=""/207}, 0xfffffffffffffc25) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x69266eb4) 05:45:53 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xc72f, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x840, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @bt={0xe5, 0x1, 0x200, 0x8, 0x9, 0x2000000000000000, 0x8}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000040)={0x5, 0x43, 0x7fff, 0x5, 0x5}) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000180)={0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f0000000200)={@remote={[], 0x1}, 0x8, 'erspan0\x00'}) 05:45:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000010000100000000000000000000000000", @ANYRES32=r1, @ANYBLOB="0080000000000000240021007b7d6a86ab3bcdda464084140001006272696467655f736c617665000000000c0005000800220060000000"], 0x44}}, 0x0) 05:45:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 242.554458] audit: type=1800 audit(1551937553.957:31): pid=7824 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16542 res=0 [ 242.640857] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 242.652966] INFO: trying to register non-static key. [ 242.658093] the code is fine but needs lockdep annotation. [ 242.663710] turning off the locking correctness validator. [ 242.669343] CPU: 1 PID: 7832 Comm: syz-executor.3 Not tainted 5.0.0+ #9 [ 242.676088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.685429] Call Trace: [ 242.688074] dump_stack+0x172/0x1f0 [ 242.691706] register_lock_class+0x16d9/0x1870 [ 242.696273] ? add_lock_to_list.isra.0+0x1cd/0x3a0 [ 242.701186] ? save_trace+0xe0/0x290 [ 242.704882] ? is_dynamic_key+0x1c0/0x1c0 [ 242.709008] ? check_prev_add.constprop.0+0x8c7/0x23c0 [ 242.714265] __lock_acquire+0xf9/0x3fb0 [ 242.718225] ? is_dynamic_key+0x1c0/0x1c0 [ 242.722364] ? graph_lock+0x7b/0x200 [ 242.726075] ? mark_held_locks+0xf0/0xf0 [ 242.730117] ? __lock_acquire+0x548/0x3fb0 [ 242.734331] ? __lock_acquire+0x548/0x3fb0 [ 242.738552] lock_acquire+0x16f/0x3f0 [ 242.742405] ? __flush_work+0x61a/0x840 [ 242.746365] __flush_work+0x640/0x840 [ 242.750147] ? __flush_work+0x61a/0x840 [ 242.754192] ? try_wait_for_completion+0x9a/0xd0 [ 242.758938] ? insert_work+0x3a0/0x3a0 [ 242.762811] ? mark_held_locks+0xa4/0xf0 [ 242.766883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.772446] ? refcount_sub_and_test_checked+0x154/0x200 [ 242.777881] ? refcount_dec_not_one+0x1f0/0x1f0 [ 242.782589] ? __drm_atomic_helper_crtc_destroy_state+0xf3/0x340 [ 242.788721] flush_work+0x18/0x20 [ 242.792201] vkms_atomic_crtc_destroy_state+0x2d/0x40 [ 242.797401] drm_atomic_state_default_clear+0x37c/0xd60 [ 242.802756] drm_atomic_state_clear+0x9d/0xc0 [ 242.807233] __drm_atomic_state_free+0x3c/0xf0 [ 242.811811] drm_atomic_helper_set_config+0xe5/0x160 [ 242.816927] drm_mode_setcrtc+0x613/0x1490 [ 242.821144] ? __schedule+0x81f/0x1cc0 [ 242.825015] ? drm_mode_getcrtc+0x870/0x870 [ 242.829332] ? drm_dev_exit+0x22/0x60 [ 242.833117] ? find_held_lock+0x35/0x130 [ 242.837163] ? drm_dev_exit+0x22/0x60 [ 242.840977] ? drm_lease_owner+0x45/0x60 [ 242.845021] ? drm_is_current_master+0x5c/0x140 [ 242.849686] drm_ioctl_kernel+0x23b/0x2e0 [ 242.853813] ? drm_mode_getcrtc+0x870/0x870 [ 242.858133] ? drm_setversion+0x8c0/0x8c0 [ 242.862270] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 242.867798] ? _copy_from_user+0xdd/0x150 [ 242.871928] drm_ioctl+0x545/0xa50 [ 242.875458] ? drm_mode_getcrtc+0x870/0x870 [ 242.879771] ? drm_version+0x3d0/0x3d0 [ 242.883692] ? smack_log+0x415/0x540 [ 242.887390] ? smk_tskacc+0x2ba/0x390 [ 242.891169] ? drm_version+0x3d0/0x3d0 [ 242.895063] do_vfs_ioctl+0xd6e/0x1390 [ 242.898932] ? smk_curacc+0x7f/0xa0 [ 242.902546] ? ioctl_preallocate+0x210/0x210 [ 242.906936] ? smack_file_ioctl+0x196/0x300 [ 242.911241] ? smack_file_lock+0x240/0x240 [ 242.915466] ? __fget+0x367/0x540 [ 242.918942] ? nsecs_to_jiffies+0x30/0x30 [ 242.923073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.928634] ? security_file_ioctl+0x93/0xc0 [ 242.933025] ksys_ioctl+0xab/0xd0 [ 242.936459] __x64_sys_ioctl+0x73/0xb0 [ 242.940368] do_syscall_64+0x103/0x610 [ 242.944260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.949430] RIP: 0033:0x457f29 [ 242.952607] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 242.971490] RSP: 002b:00007efe61e71c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 242.979188] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 05:45:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 242.986437] RDX: 0000000020000180 RSI: 00000000c06864a2 RDI: 0000000000000003 [ 242.993688] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 243.000946] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efe61e726d4 [ 243.008204] R13: 00000000004bfc39 R14: 00000000004d16f8 R15: 00000000ffffffff [ 243.018608] kobject: 'loop0' (000000009624ee43): kobject_uevent_env 05:45:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:54 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x20}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x7ff, 0x41, "a23cf3c7a7cc013d21ff213d1afddd26423cc09406f3a4b4831e3b9edbdbfd91b1dd48988a199d01cad7c350aa488feb00a5895059248401d3f2d81fb9503bf17b"}, 0x49) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000200)={0x1000, "e5ce2a923e47766d75b00c2eb73f970731be26336cdd7c34b209dd482f9e2311", 0x80, 0x3, 0xd3, 0x8, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000280)={0x0, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 243.047675] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 243.069861] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 243.095051] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 243.127067] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 243.135537] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 243.157362] bridge0: port 1(bridge_slave_0) entered disabled state 05:45:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 243.212592] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 243.235608] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 243.251330] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 243.276274] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 243.293946] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 243.306727] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 243.319112] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 243.331263] audit: type=1800 audit(1551937554.737:32): pid=7857 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16542 res=0 [ 243.335645] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 243.356351] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 243.367453] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 243.376277] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 243.386207] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 243.392689] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:45:54 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)=""/58) sendfile(r1, r1, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x0) 05:45:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x20}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x7ff, 0x41, "a23cf3c7a7cc013d21ff213d1afddd26423cc09406f3a4b4831e3b9edbdbfd91b1dd48988a199d01cad7c350aa488feb00a5895059248401d3f2d81fb9503bf17b"}, 0x49) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000200)={0x1000, "e5ce2a923e47766d75b00c2eb73f970731be26336cdd7c34b209dd482f9e2311", 0x80, 0x3, 0xd3, 0x8, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000280)={0x0, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000010000100000000000000000000000000", @ANYRES32=r1, @ANYBLOB="0080000000000000240021007b7d6a86ab3bcdda464084140001006272696467655f736c617665000000000c0005000800220060000000"], 0x44}}, 0x0) 05:45:54 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x20}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x7ff, 0x41, "a23cf3c7a7cc013d21ff213d1afddd26423cc09406f3a4b4831e3b9edbdbfd91b1dd48988a199d01cad7c350aa488feb00a5895059248401d3f2d81fb9503bf17b"}, 0x49) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000200)={0x1000, "e5ce2a923e47766d75b00c2eb73f970731be26336cdd7c34b209dd482f9e2311", 0x80, 0x3, 0xd3, 0x8, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000280)={0x0, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 243.438421] kobject: 'loop2' (00000000711d1ec0): kobject_uevent_env [ 243.445935] kobject: 'loop2' (00000000711d1ec0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 243.469069] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 05:45:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 243.489205] audit: type=1800 audit(1551937554.887:33): pid=7876 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16569 res=0 05:45:54 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) r2 = socket$inet(0x10, 0x400000000002, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="4c0000001200ff09fffefd856fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000006400)=[{{0x0, 0x2, 0x0}}], 0x565, 0x2, 0x0) rseq(&(0x7f0000000000), 0x20, 0x200000000000001, 0x0) 05:45:54 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 05:45:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000040)=0x60) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000d240)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e24, 0xffffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x400}}, 0x1, 0x4, 0x2, 0x9, 0x2}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x8001, 0x30}, 0xc) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 243.547557] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 243.563773] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:45:55 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x20}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x7ff, 0x41, "a23cf3c7a7cc013d21ff213d1afddd26423cc09406f3a4b4831e3b9edbdbfd91b1dd48988a199d01cad7c350aa488feb00a5895059248401d3f2d81fb9503bf17b"}, 0x49) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000200)={0x1000, "e5ce2a923e47766d75b00c2eb73f970731be26336cdd7c34b209dd482f9e2311", 0x80, 0x3, 0xd3, 0x8, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000280)={0x0, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 243.604490] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 243.633928] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 05:45:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) close(r0) [ 243.659974] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 243.671825] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 243.693477] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 243.726873] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 243.733375] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 243.766506] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 243.794187] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 243.804279] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 243.827476] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 243.846582] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 243.853365] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 243.865141] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 243.877709] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 243.887191] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 243.897750] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 243.909711] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 243.909780] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 243.918512] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 243.926977] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:45:55 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)=""/58) sendfile(r1, r1, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x0) 05:45:55 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x20}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x7ff, 0x41, "a23cf3c7a7cc013d21ff213d1afddd26423cc09406f3a4b4831e3b9edbdbfd91b1dd48988a199d01cad7c350aa488feb00a5895059248401d3f2d81fb9503bf17b"}, 0x49) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000200)={0x1000, "e5ce2a923e47766d75b00c2eb73f970731be26336cdd7c34b209dd482f9e2311", 0x80, 0x3, 0xd3, 0x8, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000280)={0x0, 0x7}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) close(r0) 05:45:55 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) [ 243.959348] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 243.965144] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 243.968691] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 05:45:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) close(r0) [ 244.007613] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 244.018687] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 244.031972] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 244.039001] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 244.039926] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 244.073443] audit: type=1800 audit(1551937555.477:34): pid=7912 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16577 res=0 [ 244.077644] kobject: 'loop2' (00000000711d1ec0): kobject_uevent_env [ 244.099313] kobject: 'loop2' (00000000711d1ec0): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:45:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000040)=0x60) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000d240)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e24, 0xffffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x400}}, 0x1, 0x4, 0x2, 0x9, 0x2}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x8001, 0x30}, 0xc) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) [ 244.129881] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 244.140035] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 244.146768] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 244.193944] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 244.242721] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 244.254870] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 244.263206] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 244.274238] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 244.281882] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 244.297407] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 244.303983] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:45:55 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) r2 = socket$inet(0x10, 0x400000000002, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="4c0000001200ff09fffefd856fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000006400)=[{{0x0, 0x2, 0x0}}], 0x565, 0x2, 0x0) rseq(&(0x7f0000000000), 0x20, 0x200000000000001, 0x0) 05:45:55 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x20}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x7ff, 0x41, "a23cf3c7a7cc013d21ff213d1afddd26423cc09406f3a4b4831e3b9edbdbfd91b1dd48988a199d01cad7c350aa488feb00a5895059248401d3f2d81fb9503bf17b"}, 0x49) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000200)={0x1000, "e5ce2a923e47766d75b00c2eb73f970731be26336cdd7c34b209dd482f9e2311", 0x80, 0x3, 0xd3, 0x8, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:55 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 05:45:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 244.393385] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 244.413531] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 244.527222] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 244.538107] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:45:56 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)=""/58) sendfile(r1, r1, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[], 0x0) 05:45:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(0xffffffffffffffff) 05:45:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x20}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x7ff, 0x41, "a23cf3c7a7cc013d21ff213d1afddd26423cc09406f3a4b4831e3b9edbdbfd91b1dd48988a199d01cad7c350aa488feb00a5895059248401d3f2d81fb9503bf17b"}, 0x49) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000200)={0x1000, "e5ce2a923e47766d75b00c2eb73f970731be26336cdd7c34b209dd482f9e2311", 0x80, 0x3, 0xd3, 0x8, 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:56 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) r2 = socket$inet(0x10, 0x400000000002, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="4c0000001200ff09fffefd856fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000006400)=[{{0x0, 0x2, 0x0}}], 0x565, 0x2, 0x0) rseq(&(0x7f0000000000), 0x20, 0x200000000000001, 0x0) [ 244.616303] kobject: 'loop2' (00000000711d1ec0): kobject_uevent_env [ 244.636986] kobject: 'loop2' (00000000711d1ec0): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:45:56 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 05:45:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(0xffffffffffffffff) [ 244.670979] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 244.701581] audit: type=1800 audit(1551937556.107:35): pid=7957 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16576 res=0 [ 244.706117] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 244.769692] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 244.786089] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 244.804915] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env 05:45:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000040)=0x60) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f000000d240)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e24, 0xffffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x400}}, 0x1, 0x4, 0x2, 0x9, 0x2}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x8001, 0x30}, 0xc) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 05:45:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x20}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0x7ff, 0x41, "a23cf3c7a7cc013d21ff213d1afddd26423cc09406f3a4b4831e3b9edbdbfd91b1dd48988a199d01cad7c350aa488feb00a5895059248401d3f2d81fb9503bf17b"}, 0x49) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(0xffffffffffffffff) 05:45:56 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) [ 244.822486] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 244.850051] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 244.856597] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:45:56 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) r2 = socket$inet(0x10, 0x400000000002, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="4c0000001200ff09fffefd856fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000006400)=[{{0x0, 0x2, 0x0}}], 0x565, 0x2, 0x0) rseq(&(0x7f0000000000), 0x20, 0x200000000000001, 0x0) 05:45:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1, 0x20}, &(0x7f0000000140)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 244.921091] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 244.942883] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 244.985229] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 244.999336] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 245.032955] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 245.043385] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 245.062964] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 245.075061] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 245.105237] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 245.113724] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 245.136721] kobject: 'loop0' (000000009624ee43): kobject_uevent_env 05:45:56 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)=""/58) sendfile(r1, r1, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000040)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) 05:45:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x657f, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:56 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:56 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 05:45:56 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) r2 = socket$inet(0x10, 0x400000000002, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="4c0000001200ff09fffefd856fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000006400)=[{{0x0, 0x2, 0x0}}], 0x565, 0x2, 0x0) [ 245.155147] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 245.178837] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 245.212502] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 245.238173] __nla_parse: 71 callbacks suppressed [ 245.238182] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:45:56 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 245.262175] kobject: 'loop2' (00000000711d1ec0): kobject_uevent_env [ 245.278968] kobject: 'loop2' (00000000711d1ec0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 245.306198] audit: type=1800 audit(1551937556.707:36): pid=8005 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16576 res=0 [ 245.329013] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 245.348989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:45:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:56 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 245.355574] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 245.361400] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 245.374853] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 245.393451] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 245.397564] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:45:56 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) 05:45:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 245.431644] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 245.436611] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 245.481370] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 245.486822] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 245.514609] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 245.519782] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 245.538199] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 245.548621] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 245.572666] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 245.591514] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 245.612207] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 245.618710] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 245.629076] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env 05:45:57 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)=""/58) sendfile(r1, r1, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000040)) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:45:57 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:57 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:57 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 05:45:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) r2 = socket$inet(0x10, 0x400000000002, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="4c0000001200ff09fffefd856fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 245.637368] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 245.652114] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 245.658557] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 245.668597] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 245.676474] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:45:57 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) close(r0) [ 245.720490] audit: type=1800 audit(1551937557.127:37): pid=8036 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16592 res=0 [ 245.726041] kobject: 'loop2' (00000000711d1ec0): kobject_uevent_env 05:45:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) socket$inet(0x10, 0x400000000002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") 05:45:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) close(r0) 05:45:57 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 245.774037] kobject: 'loop2' (00000000711d1ec0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 245.797248] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env 05:45:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 245.848003] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 245.874306] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 245.901247] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 245.918216] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 245.927695] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 245.937624] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 245.951531] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 245.967593] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 245.976166] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 245.986022] kobject: 'loop1' (00000000c1312745): kobject_uevent_env 05:45:57 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)=""/58) sendfile(r1, r1, &(0x7f00000000c0), 0x0) pipe(&(0x7f0000000040)) 05:45:57 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) 05:45:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) socket$inet(0x10, 0x400000000002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 05:45:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) close(r0) 05:45:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 245.996150] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 246.006025] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env 05:45:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:57 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 05:45:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 246.049019] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' 05:45:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) socket$inet(0x10, 0x400000000002, 0x0) 05:45:57 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) 05:45:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 246.081707] audit: type=1800 audit(1551937557.487:38): pid=8073 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16577 res=0 [ 246.096453] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 246.127443] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 246.165551] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 246.183996] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 246.223105] kobject: 'loop2' (00000000711d1ec0): kobject_uevent_env [ 246.233011] kobject: 'loop2' (00000000711d1ec0): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 246.242925] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 246.251590] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 246.261502] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 246.267957] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 246.279950] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 246.286395] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 246.303356] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 246.311922] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:45:57 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)=""/58) sendfile(r1, r1, &(0x7f00000000c0), 0x0) 05:45:57 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 05:45:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) 05:45:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:57 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:57 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@remote, @in6=@rand_addr="4b56c54ec0f154b56012cd53a569d716", 0x4e21, 0x6065, 0x4e24, 0x3f, 0xa, 0x20, 0xa0, 0x3f, r1, r2}, {0x6, 0x401, 0x9, 0x9, 0x7, 0x5d02, 0xffff, 0x3}, {0x4, 0x7, 0x2b46f2d2, 0x3}, 0xfc, 0x6e6bb1, 0x2, 0x0, 0x1, 0x1}, {{@in6=@mcast2, 0x4d2}, 0x0, @in=@loopback, 0x3500, 0x6, 0x0, 0x4, 0x3852, 0xe5, 0xfffffffffffffffd}}, 0xe8) 05:45:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 246.323957] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 246.332107] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 246.353720] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env 05:45:57 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 05:45:57 executing program 3: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(0xffffffffffffffff) 05:45:57 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x0, r1}) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) [ 246.395765] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 246.407776] audit: type=1800 audit(1551937557.807:39): pid=8104 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16577 res=0 [ 246.417997] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env 05:45:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:57 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) getuid() [ 246.472334] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 246.496457] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 246.503948] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 246.545266] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 246.563150] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 246.592049] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 246.598695] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 246.608740] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 246.615328] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 246.626427] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 246.632986] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 246.642967] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 246.649503] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 246.659529] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 246.666030] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 246.676047] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 246.682844] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:45:58 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) ptrace$getregs(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000004c0)=""/58) [ 246.692843] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 246.699395] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 246.710106] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 246.716593] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 246.726570] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 246.733054] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' 05:45:58 executing program 3: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(0xffffffffffffffff) 05:45:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:58 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000240)={0x0, r1}) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) 05:45:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:58 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@empty}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) 05:45:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 246.743131] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 246.764175] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 246.774731] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 246.781372] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:45:58 executing program 3: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(0xffffffffffffffff) 05:45:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 246.797035] kobject: 'loop2' (00000000711d1ec0): kobject_uevent_env [ 246.813931] audit: type=1800 audit(1551937558.217:40): pid=8130 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16577 res=0 [ 246.832708] kobject: 'loop2' (00000000711d1ec0): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:45:58 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) eventfd(0x0) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) 05:45:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 246.885281] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 246.900184] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:45:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="7b1af8ff0000000079a2f8ff00000000bf200000000000009500080000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 246.930415] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 246.945277] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 246.961960] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 246.975749] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 246.987420] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 247.004051] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 247.016810] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 247.023409] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 247.035629] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 247.042364] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 247.054496] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 247.061210] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 247.073298] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env 05:45:58 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000500)='y\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 05:45:58 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) 05:45:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:58 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:58 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) 05:45:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x48) [ 247.080024] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 247.092686] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 247.099127] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' 05:45:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:58 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:58 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 05:45:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:58 executing program 1: openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) [ 247.150623] kobject: 'loop2' (00000000711d1ec0): kobject_uevent_env [ 247.171062] kobject: 'loop2' (00000000711d1ec0): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:45:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x48) [ 247.223655] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 247.237210] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 247.266727] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 247.291472] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 247.310620] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 247.323959] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 247.340370] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 247.346824] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 247.358388] kobject: 'loop3' (00000000b4f7039a): kobject_uevent_env [ 247.364879] kobject: 'loop3' (00000000b4f7039a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 247.374862] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 247.381337] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 247.391156] kobject: 'loop5' (00000000a97225e7): kobject_uevent_env [ 247.397593] kobject: 'loop5' (00000000a97225e7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 247.407431] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 247.413914] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' 05:45:58 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) 05:45:58 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:58 executing program 1: rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) 05:45:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:58 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 05:45:58 executing program 1: rseq(0x0, 0x0, 0x0, 0x0) 05:45:58 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) [ 247.577963] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 247.587931] kauditd_printk_skb: 1 callbacks suppressed [ 247.587949] audit: type=1800 audit(1551937558.997:42): pid=8207 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16619 res=0 05:45:59 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x4002, 0x0) sendfile(r0, r1, &(0x7f0000d83ff8), 0x8000fffffffe) [ 247.635503] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 247.663067] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env 05:45:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:59 executing program 1: rseq(0x0, 0x0, 0x0, 0x0) [ 247.695474] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' 05:45:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 05:45:59 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 247.736344] audit: type=1800 audit(1551937559.137:43): pid=8229 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16619 res=0 [ 247.780153] kobject: 'loop2' (00000000711d1ec0): kobject_uevent_env 05:45:59 executing program 1: rseq(0x0, 0x0, 0x0, 0x0) 05:45:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:59 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 247.827540] kobject: 'loop2' (00000000711d1ec0): fill_kobj_path: path = '/devices/virtual/block/loop2' 05:45:59 executing program 1: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) 05:45:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) [ 247.896198] kobject: 'loop4' (000000006d4b98fe): kobject_uevent_env [ 247.933787] kobject: 'loop4' (000000006d4b98fe): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 247.974881] kobject: 'loop0' (000000009624ee43): kobject_uevent_env [ 248.003455] kobject: 'loop0' (000000009624ee43): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 248.063696] kobject: 'loop1' (00000000c1312745): kobject_uevent_env [ 248.075991] kobject: 'loop1' (00000000c1312745): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 248.100058] kobject: 'loop0' (000000009624ee43): kobject_uevent_env 05:45:59 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000600)=[{{}, 0x17}, {{0x0, 0x7530}, 0x0, 0x101}], 0x30) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) sendfile(r0, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) 05:45:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:59 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000080), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="05000000000000000000000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000080000000000000000000000c4d981ae211e6951d81159b40690545606a2bbfd1208499c4d159743ef5b8098543124dabeb6a0c3a234f5cdf1049e6f709e6301ffa529d563acaab979cc356fb9299094e0bc196da1b5f29ab1d99d715373b0f2ea99ce3efec10224464096b9edcb087b2fcb20120bd5524695dc5af6fa4c620cf1eaa8c1e1a887aa154fd1df3edb02b76d77"], 0x20000108}}, 0x0) close(r0) 05:45:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x48) 05:45:59 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000400000/0x4000)=nil, 0x4000) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x2) 05:45:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mount(0x0, 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x0, 0x0) mlock(&(0x7f000019c000/0x2000)=nil, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f000040a000/0x2000)=nil, 0x2000, 0x0, 0