Warning: Permanently added '10.128.0.245' (ECDSA) to the list of known hosts. 2019/11/06 14:54:01 fuzzer started 2019/11/06 14:54:03 dialing manager at 10.128.0.105:44951 2019/11/06 14:54:03 syscalls: 2553 2019/11/06 14:54:03 code coverage: enabled 2019/11/06 14:54:03 comparison tracing: enabled 2019/11/06 14:54:03 extra coverage: extra coverage is not supported by the kernel 2019/11/06 14:54:03 setuid sandbox: enabled 2019/11/06 14:54:03 namespace sandbox: enabled 2019/11/06 14:54:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 14:54:03 fault injection: enabled 2019/11/06 14:54:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 14:54:03 net packet injection: enabled 2019/11/06 14:54:03 net device setup: enabled 2019/11/06 14:54:03 concurrency sanitizer: enabled 2019/11/06 14:54:03 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/06 14:54:07 adding functions to KCSAN blacklist: 'blk_mq_dispatch_rq_list' 'wbt_done' 'ktime_get_real_seconds' 'taskstats_exit' 'ext4_nonda_switch' '__hrtimer_run_queues' 'pid_update_inode' 'tomoyo_supervisor' 'dd_has_work' 'sit_tunnel_xmit' 'add_timer' 'find_next_bit' 'tick_do_update_jiffies64' 'do_nanosleep' '__skb_try_recv_from_queue' 'echo_char' 'pipe_poll' 'tcp_add_backlog' 'ep_poll' 'generic_permission' 'rcu_gp_fqs_check_wake' 14:54:14 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) 14:54:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) syzkaller login: [ 80.836196][ T8042] IPVS: ftp: loaded support on port[0] = 21 [ 80.971129][ T8042] chnl_net:caif_netlink_parms(): no params data found [ 81.011475][ T8045] IPVS: ftp: loaded support on port[0] = 21 [ 81.039388][ T8042] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.046595][ T8042] bridge0: port 1(bridge_slave_0) entered disabled state 14:54:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4}) [ 81.056073][ T8042] device bridge_slave_0 entered promiscuous mode [ 81.079119][ T8042] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.086191][ T8042] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.097378][ T8042] device bridge_slave_1 entered promiscuous mode [ 81.157481][ T8042] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.191821][ T8042] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.213903][ T8045] chnl_net:caif_netlink_parms(): no params data found [ 81.264299][ T8042] team0: Port device team_slave_0 added [ 81.279726][ T8042] team0: Port device team_slave_1 added [ 81.295860][ T8045] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.318718][ T8045] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.326675][ T8045] device bridge_slave_0 entered promiscuous mode [ 81.344132][ T8045] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.351348][ T8045] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.360587][ T8045] device bridge_slave_1 entered promiscuous mode 14:54:15 executing program 3: setresuid(0x0, 0xfffe, 0x0) shmget$private(0x0, 0x3000, 0x1800, &(0x7f0000ffd000/0x3000)=nil) [ 81.395065][ T8048] IPVS: ftp: loaded support on port[0] = 21 [ 81.461251][ T8042] device hsr_slave_0 entered promiscuous mode [ 81.509013][ T8042] device hsr_slave_1 entered promiscuous mode [ 81.571813][ T8045] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.617613][ T8050] IPVS: ftp: loaded support on port[0] = 21 [ 81.659943][ T8045] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.731886][ T8042] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.739941][ T8042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.748951][ T8042] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.756068][ T8042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.891738][ T8045] team0: Port device team_slave_0 added [ 81.935793][ T8045] team0: Port device team_slave_1 added 14:54:16 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x50}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 82.010432][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.040269][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.095894][ T8042] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.191048][ T8045] device hsr_slave_0 entered promiscuous mode [ 82.238960][ T8045] device hsr_slave_1 entered promiscuous mode [ 82.258669][ T8045] debugfs: Directory 'hsr0' with parent '/' already present! [ 82.294697][ T8042] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.311328][ T8048] chnl_net:caif_netlink_parms(): no params data found [ 82.330692][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.349087][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.414501][ T8050] chnl_net:caif_netlink_parms(): no params data found [ 82.425650][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.440724][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.509697][ T8074] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.516842][ T8074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.560253][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.600518][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.640632][ T8074] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.647709][ T8074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.711164][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.750203][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.824572][ T8079] IPVS: ftp: loaded support on port[0] = 21 [ 82.863552][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.890471][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.948002][ T8042] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.018642][ T8042] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.141981][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.159952][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 14:54:17 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) [ 83.231824][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.292667][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.362283][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.403008][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.452026][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.524361][ T8050] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.571100][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.612018][ T8050] device bridge_slave_0 entered promiscuous mode [ 83.659489][ T8048] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.666557][ T8048] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.719473][ T8048] device bridge_slave_0 entered promiscuous mode [ 83.796165][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.819740][ T8050] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.826815][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.869860][ T8050] device bridge_slave_1 entered promiscuous mode [ 83.940502][ T8048] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.947570][ T8048] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.979315][ T8048] device bridge_slave_1 entered promiscuous mode [ 84.005226][ T8042] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.005398][ T8102] IPVS: ftp: loaded support on port[0] = 21 [ 84.057129][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 84.078974][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 84.093274][ T8050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.137892][ T8050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.191849][ T8048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.228466][ T8050] team0: Port device team_slave_0 added [ 84.280097][ T8048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.319918][ T8050] team0: Port device team_slave_1 added [ 84.331743][ T8045] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.416793][ T8048] team0: Port device team_slave_0 added [ 84.510867][ T8050] device hsr_slave_0 entered promiscuous mode [ 84.548949][ T8050] device hsr_slave_1 entered promiscuous mode 14:54:18 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) [ 84.588648][ T8050] debugfs: Directory 'hsr0' with parent '/' already present! [ 84.603988][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 84.616717][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 84.644022][ T8045] 8021q: adding VLAN 0 to HW filter on device team0 [ 84.661668][ T8048] team0: Port device team_slave_1 added [ 84.734805][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 84.769262][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 84.802924][ T8074] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.810571][ T8074] bridge0: port 1(bridge_slave_0) entered forwarding state 14:54:18 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) [ 84.851953][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.871687][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.911912][ T8074] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.919104][ T8074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.952325][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.979653][ T8074] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 14:54:19 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) [ 85.069200][ T8048] device hsr_slave_0 entered promiscuous mode [ 85.117235][ T8048] device hsr_slave_1 entered promiscuous mode [ 85.168494][ T8048] debugfs: Directory 'hsr0' with parent '/' already present! [ 85.262956][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.320514][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 85.350106][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 14:54:19 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) [ 85.380024][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 85.419667][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 85.428479][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 85.489273][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.497514][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 85.534277][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.594406][ T8045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 85.628642][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 14:54:19 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) [ 85.643959][ T8079] chnl_net:caif_netlink_parms(): no params data found [ 85.752622][ T8045] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 85.793234][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 85.808795][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 14:54:20 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) [ 85.966840][ T8050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.042944][ T8102] chnl_net:caif_netlink_parms(): no params data found [ 86.123474][ T8050] 8021q: adding VLAN 0 to HW filter on device team0 [ 86.185315][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.199450][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.268867][ T8079] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.275951][ T8079] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.343398][ T8079] device bridge_slave_0 entered promiscuous mode [ 86.446212][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 14:54:20 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) [ 86.489451][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 86.497868][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.504925][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.633884][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 86.689145][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 86.697558][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 86.704613][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 86.819220][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.892930][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 86.949642][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 86.958270][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 87.041127][ T8048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.052951][ T8079] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.070021][ T8079] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.129582][ T8079] device bridge_slave_1 entered promiscuous mode [ 87.191899][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.220791][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 87.240668][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 87.284713][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 87.329984][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 87.376086][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 87.437577][ T8050] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 87.485772][ T8050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 87.535531][ T8048] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.589554][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.597508][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.643571][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 87.671608][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 14:54:21 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) [ 87.710553][ T8079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.775546][ T8102] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.790705][ T8102] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.844703][ T8102] device bridge_slave_0 entered promiscuous mode [ 87.888216][ T8102] bridge0: port 2(bridge_slave_1) entered blocking state [ 87.930461][ T8102] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.962904][ T8102] device bridge_slave_1 entered promiscuous mode [ 87.980696][ T8079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.011463][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.030253][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.078660][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.085875][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.119250][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.128328][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.149096][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.156228][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.179250][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.197474][ T8048] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 88.229097][ T8048] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 88.281993][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.302366][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.321872][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.341470][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.368551][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.393468][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 88.419713][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 88.463344][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.483724][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 88.492846][ T8090] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.514689][ T8048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.544369][ T8079] team0: Port device team_slave_0 added [ 88.555911][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.574188][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 88.607266][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 88.619420][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 88.626884][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 88.638169][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 88.649191][ T8050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 88.658404][ T8102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.669453][ T8079] team0: Port device team_slave_1 added [ 88.680818][ T8102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.781519][ T8079] device hsr_slave_0 entered promiscuous mode [ 88.809281][ T8079] device hsr_slave_1 entered promiscuous mode [ 88.848715][ T8079] debugfs: Directory 'hsr0' with parent '/' already present! [ 88.869570][ T8102] team0: Port device team_slave_0 added [ 88.910740][ T8102] team0: Port device team_slave_1 added [ 89.101272][ T8102] device hsr_slave_0 entered promiscuous mode 14:54:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4}) 14:54:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) [ 89.161327][ T8102] device hsr_slave_1 entered promiscuous mode [ 89.199007][ T8102] debugfs: Directory 'hsr0' with parent '/' already present! [ 89.283778][ T8079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.366515][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 89.402879][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.450951][ T8079] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.498850][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.526800][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.596348][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.603639][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.706529][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 89.789346][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 89.797931][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.805037][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.891853][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 89.996325][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.013478][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 90.073904][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 90.133781][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 90.179673][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 90.233045][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 90.294055][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 90.336103][ T8079] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 90.380142][ T8079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 90.439084][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 90.447317][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 90.511886][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 90.585336][ T8102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.639081][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 90.646680][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 90.705346][ T8079] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.733992][ T8102] 8021q: adding VLAN 0 to HW filter on device team0 [ 90.782591][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 90.800253][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 90.859267][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 90.879458][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 90.887948][ T8289] bridge0: port 1(bridge_slave_0) entered blocking state [ 90.895016][ T8289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 91.019324][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 91.028177][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 91.113976][ T8289] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.121283][ T8289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 91.199334][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 91.239710][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.293154][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.354456][ T8289] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.406018][ T8102] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 91.458614][ T8102] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 91.529778][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 91.553896][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.613733][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.659834][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.713746][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.753393][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 91.813752][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 91.869932][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 91.951977][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 91.999235][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 92.006778][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 92.092247][ T8102] 8021q: adding VLAN 0 to HW filter on device batadv0 14:54:26 executing program 3: setresuid(0x0, 0xfffe, 0x0) shmget$private(0x0, 0x3000, 0x1800, &(0x7f0000ffd000/0x3000)=nil) [ 92.521168][ C0] hrtimer: interrupt took 37318 ns 14:54:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:26 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) 14:54:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 14:54:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x50}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 14:54:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4}) 14:54:26 executing program 3: setresuid(0x0, 0xfffe, 0x0) shmget$private(0x0, 0x3000, 0x1800, &(0x7f0000ffd000/0x3000)=nil) 14:54:26 executing program 3: setresuid(0x0, 0xfffe, 0x0) shmget$private(0x0, 0x3000, 0x1800, &(0x7f0000ffd000/0x3000)=nil) 14:54:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='hugetlb.2MB.usage_ir_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x4}) 14:54:26 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 14:54:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x50}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 14:54:27 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x50}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 14:54:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 14:54:27 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 14:54:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:27 executing program 5: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) 14:54:27 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:27 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 14:54:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 14:54:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:28 executing program 5: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) 14:54:28 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) 14:54:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/33, 0x2e}}], 0x105, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 14:54:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 14:54:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r3 = syz_open_pts(r0, 0x0) dup3(r3, r0, 0x0) 14:54:28 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) 14:54:28 executing program 5: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) 14:54:28 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:28 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xbd, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 14:54:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xe9ffffff}) 14:54:28 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:28 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) [ 94.697177][ T8433] sp0: Synchronizing with TNC 14:54:28 executing program 0: connect$can_bcm(0xffffffffffffffff, &(0x7f0000000000), 0x6e) r0 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/85) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) semget$private(0x0, 0x2000000010a, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r3, 0x0, 0x12, &(0x7f00000000c0)=""/85) r4 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r4, 0x0, 0x12, &(0x7f00000000c0)=""/85) semget$private(0x0, 0x2000000010a, 0x0) r5 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000000c0)=""/85) semctl$SEM_STAT(0x0, 0x1, 0x12, &(0x7f0000000500)=""/109) r6 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r6, 0x0, 0x12, &(0x7f00000000c0)=""/85) r7 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SEM_STAT(r7, 0x0, 0x12, &(0x7f00000000c0)=""/85) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRES64=0x2710, @ANYPTR, @ANYRES64, @ANYBLOB="0000000001000000200000000a000000b63a878ce4a87a5a"], 0x5}}, 0x0) bind$netrom(r2, &(0x7f0000000380)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @bcast]}, 0x48) 14:54:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xbd, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 14:54:28 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:29 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:29 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xe9ffffff}) [ 95.204172][ T8471] sp0: Synchronizing with TNC 14:54:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xe9ffffff}) 14:54:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:29 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:29 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xbd, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 14:54:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xe9ffffff}) [ 95.610861][ T8484] sp0: Synchronizing with TNC 14:54:29 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:29 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xe9ffffff}) 14:54:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xbd, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 14:54:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xe9ffffff}) 14:54:30 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) [ 96.427246][ T8527] sp0: Synchronizing with TNC 14:54:30 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) [ 96.593027][ T8535] sp0: Synchronizing with TNC 14:54:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x7) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xe9ffffff}) 14:54:30 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xbd, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 14:54:31 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:31 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:31 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:31 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xbd, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 14:54:31 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:32 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffc000/0x1000)=nil) 14:54:32 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:32 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:32 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x81400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001240)='./file0\x00', 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)={0x60, 0x0, 0x0, 0x7}, 0x10) getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000100), 0x4) getpid() userfaultfd(0x800) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='rpc_pipefs\x00WD%l\x8c\x8e3\xf1vS\xdeK8\xd6R\xbd\xd3\x199\'\x95J[>u\xd4l\x8c\xd3\xa6\xcf\xc99\xe0\xed^OM\x9a\xd8\xa2\xef\xee]\x11\xadD\xbe\xf7P:\xc5\xf4\xc2q', 0x0, 0x0) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000001280)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/99, 0x63}, {0x0}, {0x0}, {&(0x7f0000000680)}], 0x4, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) 14:54:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xbd, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 14:54:33 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffc000/0x1000)=nil) 14:54:33 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000480)=0x7fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x7, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x4000000000001b8, 0x12001, 0x0) 14:54:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffc000/0x1000)=nil) 14:54:33 executing program 1: syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000001640)=ANY=[@ANYBLOB="040053601e236d6a5b1e000000000000000000200000000010000000"]) pipe(0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000380)=""/230) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', &(0x7f0000000600), 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r4}}, 0x284) r5 = dup2(r1, 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r5, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0xffff, 0x507b, 0xfffffffffffffeff}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x81) 14:54:33 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="30000000000000008400000001560000"], 0x10}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 14:54:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffc000/0x1000)=nil) 14:54:34 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:34 executing program 1: syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000001640)=ANY=[@ANYBLOB="040053601e236d6a5b1e000000000000000000200000000010000000"]) pipe(0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000380)=""/230) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', &(0x7f0000000600), 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r4}}, 0x284) r5 = dup2(r1, 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r5, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0xffff, 0x507b, 0xfffffffffffffeff}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x81) 14:54:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffc000/0x1000)=nil) [ 100.341650][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 100.341669][ T26] audit: type=1800 audit(1573052074.428:31): pid=8666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16585 res=0 14:54:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="30000000000000008400000001560000"], 0x10}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 14:54:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffc000/0x1000)=nil) [ 100.665120][ T26] audit: type=1800 audit(1573052074.748:32): pid=8653 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16583 res=0 [ 100.818722][ T26] audit: type=1804 audit(1573052074.788:33): pid=8668 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir187620114/syzkaller.pUH9Id/17/file0/file0" dev="sda1" ino=16585 res=1 14:54:35 executing program 1: syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000001640)=ANY=[@ANYBLOB="040053601e236d6a5b1e000000000000000000200000000010000000"]) pipe(0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000380)=""/230) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', &(0x7f0000000600), 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r4}}, 0x284) r5 = dup2(r1, 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r5, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0xffff, 0x507b, 0xfffffffffffffeff}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x81) 14:54:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="30000000000000008400000001560000"], 0x10}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 14:54:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0}, 0x68) prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffc000/0x1000)=nil) 14:54:35 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="00fb3406f9e99d4ef8c13d9ac40c0f9383cbc4a6fbf7c29450a65cfddfb38846083dcfeb4ed890028f2c01e8f5c83513ba8e5095ceb1292180f7806f1abb78ac5b3debde8f00879cc8185f5891ab347b32d025ce78de4823cd96ea8fc48abbee3e3abe9b94b16f9ef9a2ee65ebc4a097e3fa087f58ba16f2414251ee2b2bcd8656b424ca70242eb79577ab935086c822e4ad2084b86cbfba3ecf9d0a04a721f690997d750549c739ca36671264551dd700000000000000000000000077fc6359437fc3b20d2244ae8d184ca334dc37fc54a8e1a9e792a77a52ac0691a8936045ab499aae8a5b6f292e74b254fc7f65c7c02dfd7a3912b2f283bd64a5229b39751d424b054a1862a1f72f532c66a2db5c8342f459c3eac1d5c2f7bc5d3a2ed067c6c5f80fa52482aec3a11a88ccb4669524a19d5508d1440a3497ce65e5d2d646b6c01edc14f64c438d7a2b0ec9d25876a15696b9329d64b5c8eb16d1e301a0e26e7196dd0fbe066cd90ac54310ec34f946d61c9ee6581bcfe2635ec30000000000000000"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) [ 101.048776][ T26] audit: type=1804 audit(1573052074.788:34): pid=8666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir187620114/syzkaller.pUH9Id/17/file0/file0" dev="sda1" ino=16585 res=1 14:54:35 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:35 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:35 executing program 1: syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') dup(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = memfd_create(0x0, 0x0) dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000001640)=ANY=[@ANYBLOB="040053601e236d6a5b1e000000000000000000200000000010000000"]) pipe(0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000380)=""/230) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', &(0x7f0000000600), 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @rand_addr="fe800000000000007029e5e36fc3e001"}, r4}}, 0x284) r5 = dup2(r1, 0xffffffffffffffff) sendmsg$TIPC_NL_PEER_REMOVE(r5, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0xffff, 0x507b, 0xfffffffffffffeff}) memfd_create(0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x81) [ 101.508683][ T26] audit: type=1800 audit(1573052075.588:35): pid=8709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16616 res=0 14:54:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="30000000000000008400000001560000"], 0x10}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) [ 101.608277][ T26] audit: type=1800 audit(1573052075.678:36): pid=8719 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16620 res=0 14:54:35 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:36 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:36 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:36 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="00fb3406f9e99d4ef8c13d9ac40c0f9383cbc4a6fbf7c29450a65cfddfb38846083dcfeb4ed890028f2c01e8f5c83513ba8e5095ceb1292180f7806f1abb78ac5b3debde8f00879cc8185f5891ab347b32d025ce78de4823cd96ea8fc48abbee3e3abe9b94b16f9ef9a2ee65ebc4a097e3fa087f58ba16f2414251ee2b2bcd8656b424ca70242eb79577ab935086c822e4ad2084b86cbfba3ecf9d0a04a721f690997d750549c739ca36671264551dd700000000000000000000000077fc6359437fc3b20d2244ae8d184ca334dc37fc54a8e1a9e792a77a52ac0691a8936045ab499aae8a5b6f292e74b254fc7f65c7c02dfd7a3912b2f283bd64a5229b39751d424b054a1862a1f72f532c66a2db5c8342f459c3eac1d5c2f7bc5d3a2ed067c6c5f80fa52482aec3a11a88ccb4669524a19d5508d1440a3497ce65e5d2d646b6c01edc14f64c438d7a2b0ec9d25876a15696b9329d64b5c8eb16d1e301a0e26e7196dd0fbe066cd90ac54310ec34f946d61c9ee6581bcfe2635ec30000000000000000"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:36 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) [ 102.484250][ T26] audit: type=1800 audit(1573052076.568:37): pid=8754 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=322 res=0 14:54:36 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:36 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 102.593490][ T26] audit: type=1800 audit(1573052076.628:38): pid=8758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=323 res=0 14:54:36 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:36 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 102.707259][ T8762] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 102.732705][ T8754] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 102.749768][ T8754] FAT-fs (loop4): Filesystem has been set read-only [ 102.797610][ T8762] FAT-fs (loop3): Filesystem has been set read-only 14:54:37 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:37 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:37 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:37 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:37 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:37 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 103.382699][ T26] audit: type=1800 audit(1573052077.468:39): pid=8797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16610 res=0 [ 103.498668][ T26] audit: type=1800 audit(1573052077.578:40): pid=8806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16623 res=0 14:54:37 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="00fb3406f9e99d4ef8c13d9ac40c0f9383cbc4a6fbf7c29450a65cfddfb38846083dcfeb4ed890028f2c01e8f5c83513ba8e5095ceb1292180f7806f1abb78ac5b3debde8f00879cc8185f5891ab347b32d025ce78de4823cd96ea8fc48abbee3e3abe9b94b16f9ef9a2ee65ebc4a097e3fa087f58ba16f2414251ee2b2bcd8656b424ca70242eb79577ab935086c822e4ad2084b86cbfba3ecf9d0a04a721f690997d750549c739ca36671264551dd700000000000000000000000077fc6359437fc3b20d2244ae8d184ca334dc37fc54a8e1a9e792a77a52ac0691a8936045ab499aae8a5b6f292e74b254fc7f65c7c02dfd7a3912b2f283bd64a5229b39751d424b054a1862a1f72f532c66a2db5c8342f459c3eac1d5c2f7bc5d3a2ed067c6c5f80fa52482aec3a11a88ccb4669524a19d5508d1440a3497ce65e5d2d646b6c01edc14f64c438d7a2b0ec9d25876a15696b9329d64b5c8eb16d1e301a0e26e7196dd0fbe066cd90ac54310ec34f946d61c9ee6581bcfe2635ec30000000000000000"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:38 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:38 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 14:54:38 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:38 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) [ 104.582290][ T8853] ================================================================== [ 104.590444][ T8853] BUG: KCSAN: data-race in blk_mq_get_request / blk_mq_get_request [ 104.598329][ T8853] [ 104.600666][ T8853] write to 0xffff88812a1c9948 of 8 bytes by task 8849 on cpu 1: [ 104.608310][ T8853] blk_mq_get_request+0x8e1/0xb50 [ 104.613331][ T8853] blk_mq_make_request+0x2d9/0xf60 [ 104.618443][ T8853] generic_make_request+0x196/0x740 [ 104.623647][ T8853] submit_bio+0x96/0x3c0 [ 104.627896][ T8853] submit_bh_wbc+0x40f/0x460 [ 104.632496][ T8853] write_dirty_buffer+0x83/0x100 [ 104.637437][ T8853] fat_sync_bhs+0x59/0x14b [ 104.641863][ T8853] fat_alloc_clusters+0xae6/0xc40 [ 104.646895][ T8853] fat_add_cluster+0x3d/0xd0 [ 104.651507][ T8853] fat_get_block+0x3ae/0x4e0 [ 104.656104][ T8853] __block_write_begin_int+0x2ea/0xf20 [ 104.661565][ T8853] block_write_begin+0x77/0x160 [ 104.666427][ T8853] cont_write_begin+0x3d6/0x670 [ 104.671281][ T8853] fat_write_begin+0x72/0xc0 [ 104.675883][ T8853] generic_perform_write+0x136/0x320 [ 104.681184][ T8853] __generic_file_write_iter+0x2eb/0x380 [ 104.686831][ T8853] generic_file_write_iter+0x28c/0x390 [ 104.692474][ T8853] new_sync_write+0x388/0x4a0 [ 104.697165][ T8853] __vfs_write+0xb1/0xc0 [ 104.701419][ T8853] vfs_write+0x18a/0x390 [ 104.705677][ T8853] ksys_write+0xd5/0x1b0 [ 104.709930][ T8853] __x64_sys_write+0x4c/0x60 [ 104.714532][ T8853] do_syscall_64+0xcc/0x370 [ 104.719047][ T8853] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.721137][ T8849] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 104.724928][ T8853] [ 104.724950][ T8853] read to 0xffff88812a1c9948 of 8 bytes by task 8853 on cpu 0: [ 104.724974][ T8853] blk_mq_get_request+0x8ce/0xb50 [ 104.724993][ T8853] blk_mq_make_request+0x2d9/0xf60 [ 104.725011][ T8853] generic_make_request+0x196/0x740 [ 104.725088][ T8853] submit_bio+0x96/0x3c0 [ 104.763565][ T8853] mpage_readpages+0x36c/0x3c0 [ 104.768431][ T8853] blkdev_readpages+0x36/0x50 [ 104.774343][ T8853] read_pages+0xa2/0x2d0 14:54:38 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:38 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) 14:54:38 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x0, @empty}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000011c0)={0x0, 0x0, 0x30}, 0xc) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 104.777170][ T8849] FAT-fs (loop3): Filesystem has been set read-only [ 104.778595][ T8853] __do_page_cache_readahead+0x353/0x390 [ 104.778615][ T8853] force_page_cache_readahead+0x13a/0x1f0 [ 104.778632][ T8853] page_cache_sync_readahead+0x1cf/0x1e0 [ 104.778654][ T8853] generic_file_read_iter+0xeb6/0x1440 [ 104.778675][ T8853] blkdev_read_iter+0xb2/0xe0 [ 104.778696][ T8853] new_sync_read+0x389/0x4f0 [ 104.778715][ T8853] __vfs_read+0xb1/0xc0 [ 104.778734][ T8853] vfs_read+0x143/0x2c0 [ 104.778751][ T8853] ksys_read+0xd5/0x1b0 [ 104.778779][ T8853] __x64_sys_read+0x4c/0x60 [ 104.834772][ T8853] do_syscall_64+0xcc/0x370 [ 104.839286][ T8853] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.845188][ T8853] [ 104.847511][ T8853] Reported by Kernel Concurrency Sanitizer on: [ 104.853672][ T8853] CPU: 0 PID: 8853 Comm: blkid Not tainted 5.4.0-rc6+ #0 [ 104.860695][ T8853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.870754][ T8853] ================================================================== [ 104.878818][ T8853] Kernel panic - not syncing: panic_on_warn set ... [ 104.885424][ T8853] CPU: 0 PID: 8853 Comm: blkid Not tainted 5.4.0-rc6+ #0 [ 104.892446][ T8853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.902525][ T8853] Call Trace: [ 104.905827][ T8853] dump_stack+0xf5/0x159 [ 104.910084][ T8853] panic+0x210/0x640 [ 104.914002][ T8853] ? vprintk_func+0x8d/0x140 [ 104.918611][ T8853] kcsan_report.cold+0xc/0xe [ 104.923225][ T8853] kcsan_setup_watchpoint+0x3fe/0x410 14:54:39 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') readlinkat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=""/72, 0x48) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0xfffffffffffff577, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x200090, 0x0) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000600)='4', 0x4100) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={0x0, 0x0, 0x3f2dc89fa0eacb38}, 0x10) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="00fb3406f9e99d4ef8c13d9ac40c0f9383cbc4a6fbf7c29450a65cfddfb38846083dcfeb4ed890028f2c01e8f5c83513ba8e5095ceb1292180f7806f1abb78ac5b3debde8f00879cc8185f5891ab347b32d025ce78de4823cd96ea8fc48abbee3e3abe9b94b16f9ef9a2ee65ebc4a097e3fa087f58ba16f2414251ee2b2bcd8656b424ca70242eb79577ab935086c822e4ad2084b86cbfba3ecf9d0a04a721f690997d750549c739ca36671264551dd700000000000000000000000077fc6359437fc3b20d2244ae8d184ca334dc37fc54a8e1a9e792a77a52ac0691a8936045ab499aae8a5b6f292e74b254fc7f65c7c02dfd7a3912b2f283bd64a5229b39751d424b054a1862a1f72f532c66a2db5c8342f459c3eac1d5c2f7bc5d3a2ed067c6c5f80fa52482aec3a11a88ccb4669524a19d5508d1440a3497ce65e5d2d646b6c01edc14f64c438d7a2b0ec9d25876a15696b9329d64b5c8eb16d1e301a0e26e7196dd0fbe066cd90ac54310ec34f946d61c9ee6581bcfe2635ec30000000000000000"], 0x1, 0x2) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x100000008004) syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/19, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x2}}, 0x0) [ 104.928641][ T8853] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 104.934390][ T8853] __tsan_read8+0x145/0x1f0 [ 104.938906][ T8853] blk_mq_get_request+0x8ce/0xb50 [ 104.943976][ T8853] ? constant_test_bit+0x30/0x30 [ 104.948941][ T8853] blk_mq_make_request+0x2d9/0xf60 [ 104.954086][ T8853] generic_make_request+0x196/0x740 [ 104.959300][ T8853] ? do_mpage_readpage+0x254/0x10e0 [ 104.964517][ T8853] submit_bio+0x96/0x3c0 [ 104.968775][ T8853] ? guard_bio_eod+0x131/0x3b0 [ 104.974086][ T8853] mpage_readpages+0x36c/0x3c0 [ 104.978955][ T8853] ? constant_test_bit.constprop.0+0x20/0x20 [ 104.984948][ T8853] ? blkdev_write_begin+0x60/0x60 [ 104.989986][ T8853] blkdev_readpages+0x36/0x50 [ 104.994666][ T8853] read_pages+0xa2/0x2d0 [ 104.998915][ T8853] ? 0xffffffff81000000 [ 105.003081][ T8853] __do_page_cache_readahead+0x353/0x390 [ 105.008721][ T8853] force_page_cache_readahead+0x13a/0x1f0 [ 105.014442][ T8853] page_cache_sync_readahead+0x1cf/0x1e0 [ 105.020079][ T8853] generic_file_read_iter+0xeb6/0x1440 [ 105.025553][ T8853] blkdev_read_iter+0xb2/0xe0 [ 105.030230][ T8853] new_sync_read+0x389/0x4f0 [ 105.034849][ T8853] __vfs_read+0xb1/0xc0 [ 105.039005][ T8853] vfs_read+0x143/0x2c0 [ 105.043162][ T8853] ksys_read+0xd5/0x1b0 [ 105.047324][ T8853] __x64_sys_read+0x4c/0x60 [ 105.051827][ T8853] do_syscall_64+0xcc/0x370 [ 105.056330][ T8853] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.062225][ T8853] RIP: 0033:0x7fe77c406310 [ 105.066733][ T8853] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 105.086330][ T8853] RSP: 002b:00007ffe67a27008 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 105.094756][ T8853] RAX: ffffffffffffffda RBX: 0000000000033000 RCX: 00007fe77c406310 [ 105.102726][ T8853] RDX: 0000000000000029 RSI: 0000000001ddb048 RDI: 0000000000000003 [ 105.110696][ T8853] RBP: 0000000001ddb020 R08: 0000000000000058 R09: 0101010101010101 [ 105.119098][ T8853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001dd5030 [ 105.127081][ T8853] R13: 0000000000000029 R14: 0000000001dd5080 R15: 0000000001ddb038 [ 105.136347][ T8853] Kernel Offset: disabled [ 105.140784][ T8853] Rebooting in 86400 seconds..