d404ea657b43e6f85292475a8ec52bc5cec693fc2a8677ab861e3a51901afae306b65f083c56df5fc476365e5bc18a6b5f79612798b301fcba5b057ce7a091e100edadf4d47d5b0b227a4f5566076fc1f99457a60bfbe0663056761ed89ceb1936e8c1051d502c43b3b55378bb5db5fa495d5c0908818e06a25") sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000100)={0x5, 0x1f, 0xfa0, 0xfffffffffffff801, 0x6}) 12:34:00 executing program 1: 12:34:00 executing program 3: r0 = socket$tipc(0xa, 0x1, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0xa, 0x2, 0x0, {{0x0, 0xfec00000}}}, 0x22) 12:34:00 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:00 executing program 2: [ 626.897877] *** Guest State *** [ 626.915385] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 626.926652] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 626.997101] CR3 = 0x0000000000000000 12:34:00 executing program 3: 12:34:00 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') write$P9_RWRITE(r0, &(0x7f0000000240)={0xb, 0x77, 0x2, 0x8}, 0xb) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffff9c}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x1, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r1, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1000}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x20000810) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x400000002200bffc, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r5, &(0x7f0000000280)={0x2, 0x81}, 0x2) sendmsg$nl_route(r4, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) [ 627.017657] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 627.033911] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 627.042769] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 12:34:00 executing program 1: [ 627.062648] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.084141] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.103341] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.121639] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.131902] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.159839] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.187475] GDTR: limit=0x00000000, base=0x0000000000000000 [ 627.213674] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.231040] IDTR: limit=0x00000000, base=0x0000000000000000 [ 627.242064] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.264613] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 627.271320] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 627.279404] Interruptibility = 00000000 ActivityState = 00000000 [ 627.286079] *** Host State *** [ 627.289295] RIP = 0xffffffff812048fe RSP = 0xffff88818ae57390 [ 627.295954] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 627.302377] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 627.310320] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 627.316300] CR0=0000000080050033 CR3=00000001c35ee000 CR4=00000000001426e0 [ 627.323330] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 627.330118] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 627.336251] *** Control State *** [ 627.339762] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 627.346510] EntryControls=0000d3ff ExitControls=002fefff [ 627.351988] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 627.358990] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 627.365722] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 627.372309] reason=80000021 qualification=0000000000000000 [ 627.379507] IDTVectoring: info=00000000 errcode=00000000 [ 627.385294] TSC Offset = 0xfffffeadc684600d [ 627.390120] EPT pointer = 0x00000001d366301e [ 627.446169] *** Guest State *** [ 627.451787] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 627.461031] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 627.470710] CR3 = 0x0000000000000000 [ 627.474521] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 627.480633] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 627.486716] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 627.493405] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.501475] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.509622] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.517712] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.525791] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.533850] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.541978] GDTR: limit=0x00000000, base=0x0000000000000000 [ 627.550033] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.558136] IDTR: limit=0x00000000, base=0x0000000000000000 [ 627.566133] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 627.575135] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 627.582091] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 627.590312] Interruptibility = 00000000 ActivityState = 00000000 [ 627.596553] *** Host State *** [ 627.599888] RIP = 0xffffffff812048fe RSP = 0xffff88807445f390 [ 627.605888] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 627.612488] FSBase=00007fc8dabcc700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 627.621012] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 627.626912] CR0=0000000080050033 CR3=00000001c35ee000 CR4=00000000001426f0 [ 627.634051] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 627.640883] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 627.646961] *** Control State *** [ 627.650525] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 627.657220] EntryControls=0000d3ff ExitControls=002fefff [ 627.663494] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 627.670551] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 627.677255] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 627.683968] reason=80000021 qualification=0000000000000000 [ 627.690355] IDTVectoring: info=00000000 errcode=00000000 12:34:01 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:01 executing program 2: 12:34:01 executing program 3: 12:34:01 executing program 1: 12:34:01 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) faccessat(r2, &(0x7f0000000000)='./file0\x00', 0x1, 0x1100) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) rt_sigreturn() ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:01 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x48d3d470455b8105, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$netlink(0x10, 0x3, 0x9) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000000c0)=0x7) sendmsg$nl_route(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) [ 627.695849] TSC Offset = 0xfffffeadc684600d [ 627.700267] EPT pointer = 0x00000001d366301e 12:34:01 executing program 3: 12:34:01 executing program 1: 12:34:01 executing program 2: 12:34:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x2, 0x200000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x5}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}}}, &(0x7f00000002c0)=0x84) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x41000800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x110, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x40000) 12:34:01 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:01 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) getsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:01 executing program 2: 12:34:01 executing program 1: 12:34:01 executing program 3: 12:34:01 executing program 1: 12:34:01 executing program 2: 12:34:01 executing program 3: 12:34:01 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 628.153411] *** Guest State *** [ 628.169739] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 12:34:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="080426bd7000fbdbdf2509000000100004000c00070008000400000000001400090008000100a30000000800020001010000"], 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002240)}, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7, 0x40) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000001, 0x1) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000200)=0x4) [ 628.246590] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 12:34:01 executing program 1: 12:34:01 executing program 3: [ 628.303286] CR3 = 0x0000000000000000 [ 628.318167] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 628.327978] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 628.334494] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 628.341502] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:02 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x3, 0x0, 0x0) [ 628.351319] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.401204] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.436722] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.472732] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.482469] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.498740] GDTR: limit=0x00000000, base=0x0000000000000000 [ 628.518131] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.527613] IDTR: limit=0x00000000, base=0x0000000000000000 [ 628.561454] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.575133] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 628.582036] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 628.589684] Interruptibility = 00000000 ActivityState = 00000000 [ 628.596816] *** Host State *** [ 628.600034] RIP = 0xffffffff812048fe RSP = 0xffff888184017390 [ 628.606310] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 628.612763] FSBase=00007fc8dac2f700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 628.621003] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 628.626997] CR0=0000000080050033 CR3=00000001b592a000 CR4=00000000001426f0 [ 628.634040] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 628.640824] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 628.646978] *** Control State *** [ 628.650436] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 628.657934] EntryControls=0000d3ff ExitControls=002fefff [ 628.663680] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 628.670904] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 628.677996] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 628.684641] reason=80000021 qualification=0000000000000000 [ 628.691305] IDTVectoring: info=00000000 errcode=00000000 [ 628.696903] TSC Offset = 0xfffffead1ba6e7a3 [ 628.701275] EPT pointer = 0x00000001870e601e [ 628.720470] *** Guest State *** [ 628.723971] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 628.733592] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 628.742757] CR3 = 0x0000000000000000 [ 628.746502] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 628.753371] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 628.759512] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 628.766211] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.766252] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.766271] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.766289] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.766308] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.766327] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.766340] GDTR: limit=0x00000000, base=0x0000000000000000 [ 628.766359] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.766372] IDTR: limit=0x00000000, base=0x0000000000000000 [ 628.766395] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 628.766406] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 628.766418] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 628.766433] Interruptibility = 00000000 ActivityState = 00000000 [ 628.783548] *** Host State *** [ 628.871093] RIP = 0xffffffff812048fe RSP = 0xffff8881814af390 [ 628.877150] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 628.883718] FSBase=00007fc8dabed700 GSBase=ffff8881dad00000 TRBase=fffffe0000003000 [ 628.891772] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 628.898052] CR0=0000000080050033 CR3=00000001b592a000 CR4=00000000001426e0 [ 628.905181] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 628.912657] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 628.918915] *** Control State *** [ 628.922454] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 628.929821] EntryControls=0000d3ff ExitControls=002fefff [ 628.935414] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 628.942588] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 628.949698] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 628.956416] reason=80000021 qualification=0000000000000000 [ 628.962968] IDTVectoring: info=00000000 errcode=00000000 [ 628.968635] TSC Offset = 0xfffffeaccb08cf5e 12:34:02 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$RTC_AIE_ON(r2, 0x7001) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:02 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:02 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@mcast1, @in=@remote}}, {{@in6}, 0x0, @in=@remote}}, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 12:34:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x10000, 0x20100) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000040)=0x8) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) write$uinput_user_dev(r1, &(0x7f0000000240)={'syz0\x00', {0x7a6, 0x7, 0x9, 0x4}, 0x50, [0x7087, 0x8, 0x9b, 0x7b522a5a, 0x5, 0x4, 0x1, 0x80, 0x2, 0x198f, 0x2, 0x80, 0x2, 0x75a, 0x6, 0x57, 0xdc4b, 0x800000000000, 0x400, 0x3, 0x8000, 0x3, 0xbbdd, 0x3, 0x1, 0x9be, 0x4, 0x8, 0xff, 0xc, 0x5, 0xfffffffffffffffb, 0x6, 0xffff, 0x9, 0x6, 0x7, 0x80, 0x400, 0x7, 0x7, 0x0, 0x19, 0x4, 0x4, 0x5, 0xffffffff00000000, 0x8, 0x7ff, 0x9b0b, 0x9, 0x81, 0x401, 0x0, 0x2, 0x0, 0xca, 0x4, 0x5, 0x9, 0x1, 0x100000000, 0x100000000, 0x8], [0xfff, 0x6, 0x34, 0x380000000, 0x6, 0x6, 0x2, 0x3a, 0x101, 0x8000, 0x5, 0x8001, 0x4, 0x1, 0xf1c, 0x6, 0x0, 0x7, 0x4, 0x3f, 0x9, 0x8, 0x2, 0x9, 0x5, 0xc32, 0x4, 0x9, 0x3, 0x0, 0x6, 0x8001, 0x9, 0x1, 0x100, 0x6, 0x4, 0x626c, 0xfffffffffffffff9, 0x8001, 0x4, 0x1, 0x1, 0x8000, 0x1, 0x5, 0xfffffffffffffebe, 0x6, 0x1, 0xdb0, 0x463f, 0x0, 0x73, 0x8, 0x100, 0x2, 0x1, 0x4, 0x3f, 0x3, 0xea3, 0x7, 0x8de, 0xd9c], [0x4, 0x0, 0x0, 0x8, 0xf868, 0x541, 0xcc, 0x8, 0x10001, 0x0, 0x5, 0xffffffffffffffc1, 0x5, 0x53, 0x7, 0x10001, 0x0, 0x10001, 0x0, 0x8, 0x100000000, 0x3ff, 0x7, 0x9, 0x4, 0x0, 0x200, 0x5, 0x6, 0x10001, 0x1, 0x2, 0x400, 0x9, 0xffffffffffff5b72, 0x6, 0x5, 0x4, 0x9, 0xfffffffffffffc00, 0x6, 0xfff, 0xd33, 0xfffffffffffeffff, 0x8, 0x8000, 0x0, 0x1, 0x7, 0x2, 0x10000, 0x20, 0xff, 0x2, 0x600000000000000, 0x0, 0x100000000, 0x3, 0x8, 0x0, 0x100000000, 0x5, 0x7fffffff, 0x4], [0x1, 0xed30, 0x0, 0xcc, 0x7, 0x9, 0x8, 0x8001, 0x4, 0x280000000000, 0x10000, 0x3ff, 0x8, 0x9, 0x8, 0x80, 0x1ff, 0xffff, 0xa7, 0x80000001, 0x8, 0x1, 0x5, 0x7ff, 0x100000000, 0x9, 0x6751, 0x3f, 0x8f7c, 0x8, 0x5, 0xfffffffffffffffa, 0x3ff, 0x2, 0x3ff, 0x9, 0x4, 0x4, 0x6d6f, 0x7, 0x100000001, 0x8, 0x80, 0x37a3, 0x120000000000, 0x4, 0x0, 0x5, 0x200, 0x4, 0x0, 0xfff, 0x800, 0x2, 0x8, 0x1, 0xff, 0x0, 0x7, 0x9638, 0x10000, 0x7, 0x7a87cd3f, 0x1]}, 0x45c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000006c0)=0x8, 0x4) r2 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f00000000c0)={{0x4, 0x7, 0x3, 0x8f, '\x00', 0x200}, 0x2, 0x20c, 0x800, r2, 0x3, 0x2, 'syz1\x00', &(0x7f0000000080)=['/dev/admmidi#\x00', ':md5sum\x00', ')\x00'], 0x18, [], [0x8000, 0x4, 0x5, 0x7]}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000200)={0x0, 0x7fc, 0x8000, 0x3}, 0x10) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x1) 12:34:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000540)="2f65786500000000000409004bdd070000a4d119698f1c12750f798058439ed554fa07424adee901d2da75cb85b4b7a1350588743c8d9baf1f02acc7edbcd7a071fb35331ce39c5a8b0bd6dcaf21bc211317ffef33867ccc5b8f1439b56d341662bc8880979843b3355236be93426485f99f87998f48ad7ffa29bda080d701b70d252407218fad612e074583416711ec1053ba40f26809a95171a9") fsetxattr(r1, &(0x7f0000000200)=@known='user.syz\x00', 0x0, 0x0, 0x0) 12:34:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000540)="2f65786500000000000409004bdd070000a4d119698f1c12750f798058439ed554fa07424adee901d2da75cb85b4b7a1350588743c8d9baf1f02acc7edbcd7a071fb35331ce39c5a8b0bd6dcaf21bc211317ffef33867ccc5b8f1439b56d341662bc8880979843b3355236be93426485f99f87998f48ad7ffa29bda080d701b70d252407218fad612e074583416711ec1053ba40f26809a95171a9") fsetxattr(r0, &(0x7f0000000200)=@known='user.syz\x00', 0x0, 0x0, 0x0) [ 628.973056] EPT pointer = 0x00000001b961801e 12:34:02 executing program 1: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x802) write$nbd(r0, &(0x7f0000000100)={0x67446698, 0x0, 0x0, 0x0, 0x4}, 0x10) 12:34:02 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1009) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2e0, &(0x7f0000002240)={0x0, 0xd3}}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000640)='/dev/audio#\x00', 0x90d, 0x2380) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40100}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r2, 0x10, 0x70bd2d, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000090}, 0x40) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000300)={0x1, 0x7ff, 0x1, 0x101, 0x1, 0x8}) socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="e4cd3fa7c94d7a2161c6e58cdfb26db0000022", @ANYRES16=r3, @ANYBLOB="00022dbd7000fedbdf25050000000c00070008000100050000001800070008000200050000000c0004000300000000000000ac000500340002000800030000000000080004000400000008000200638800000800010009000000080001001a000000080001001d0000001c000200080002000900000008000300cc000000080001000700000008000100696200000c00020008000300070000000c00020008000100190000000400020034000200080001000900000008000100000000000800020043000000080001001d00000008000100070000000800030007000000"], 0xe4}}, 0x4000000) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)=0x5) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f00000005c0)={@empty, @empty, r4}, 0xc) 12:34:02 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000640)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 629.148197] *** Guest State *** [ 629.152674] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 629.163089] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 629.174265] CR3 = 0x0000000000000000 [ 629.178801] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 12:34:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023cffffff7fa070") r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x5}, 0x18) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x100000008936, &(0x7f0000000000)) 12:34:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r2}, 0x14) sendmsg$alg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)="a8689f0607dfb8056daea326d9e3", 0xe}], 0x1, 0x0, 0x0, 0x84}, 0x8010) [ 629.208058] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 629.243536] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 629.293692] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 629.329540] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 629.338169] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 629.348188] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 629.360668] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 629.374412] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 629.387909] GDTR: limit=0x00000000, base=0x0000000000000000 [ 629.402317] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 629.420610] IDTR: limit=0x00000000, base=0x0000000000000000 [ 629.433794] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 629.444475] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 629.454213] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 629.462169] Interruptibility = 00000000 ActivityState = 00000000 [ 629.474102] *** Host State *** [ 629.479940] RIP = 0xffffffff812048fe RSP = 0xffff88817f0b7390 [ 629.503810] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 629.513390] FSBase=00007fc8dac2f700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 629.526358] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 629.533542] CR0=0000000080050033 CR3=00000001bb467000 CR4=00000000001426f0 [ 629.540808] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 629.548317] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 629.555925] *** Control State *** [ 629.559599] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 629.566897] EntryControls=0000d3ff ExitControls=002fefff [ 629.572573] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 629.580883] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 629.587927] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 629.594843] reason=80000021 qualification=0000000000000000 [ 629.601219] IDTVectoring: info=00000000 errcode=00000000 [ 629.607643] TSC Offset = 0xfffffeac91d76989 [ 629.611989] EPT pointer = 0x00000001c286001e 12:34:03 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000000)={0x6c, 0x800}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = socket(0x0, 0x3, 0x1d3) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in=@rand_addr=0x1ff, 0x4e22, 0x80000000, 0x4e23, 0x7fff, 0x0, 0x80, 0xa0, 0x7f, r2, r3}, {0x2, 0x6, 0xed, 0x0, 0x7, 0x4, 0xffffffffffffff01, 0x4}, {0x3, 0x4, 0x1}, 0x1, 0x6e6bbc, 0x0, 0x1, 0x2, 0x2}, {{@in6=@remote, 0x4d4, 0x3b}, 0x0, @in=@multicast1, 0x3503, 0x4, 0x3, 0x8001, 0x3, 0xfffffffffffffff9, 0x7}}, 0xe8) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xfc24e37962ad21a6}}, 0x0) 12:34:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f9, &(0x7f0000000100)={'sit0\x00', @ifru_flags}) 12:34:03 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x200000a, 0x2032, 0xffffffffffffffff, 0x0) 12:34:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000600)="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") flistxattr(r0, &(0x7f0000000100)=""/124, 0x7c) 12:34:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) 12:34:03 executing program 4: accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000440)=0x60, 0x80000) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_tcp(0x2, 0x1, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000480)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80000) syz_open_dev$evdev(&(0x7f00000004c0)='/dev/input/event#\x00', 0x6, 0x400000) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000540)=0x1c) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x6, @mcast2, 0x101}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e21, 0x3078, @remote, 0x1}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e23, 0x98d}, @in6={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0x1f}, 0x9}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e24, 0x9, @local, 0x5}], 0xdc) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r1}) r3 = socket$netlink(0x10, 0x3, 0x1d) sendmsg$nl_route(r3, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x200, 0x20040) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0x6, @mcast2, 0x21a}}, 0x0, 0x78, 0xffffffffffffc509, 0x5, 0x40}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000640)={r5, @in={{0x2, 0x4e22, @multicast2}}, 0x7, 0xfffffffffffffffe}, 0x90) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) timerfd_settime(r4, 0x1, &(0x7f00000005c0)={{0x77359400}, {r6, r7+10000000}}, &(0x7f0000000600)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x4, 0x1, 0x5, 0x3}]}, 0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x34, 0x2, 0x7ff, 0x923, 0xca96}, 0x14) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000700)=0x5, 0x4) 12:34:03 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bond0\x00'}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000e40)=ANY=[@ANYBLOB="08000200ac1414aa140006001cd9000080ff00000000000000714fa0c4977ac20000dd5910f1a102fc3a904e93b85d0bfc8d00339824b25c7f82b3826aef790ca20b1407007d7e4041d815"], 0x1}}, 0x0) 12:34:03 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000080)="edd008000000000019a6515592000012ac6a612e2ae6d0e5dafb50c31fa76fa9d5428dfc7246c4e2811e305d46", 0x2d, 0x8000, 0x0, 0x0) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)=""/96, 0x60}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000)="dde20f100fc1c79a93edf7e95ad2a3ceb954bf7b28df4f7b", 0x18, 0x0, 0x0, 0x0) 12:34:03 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x1, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 12:34:03 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0x1000, 0x4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:34:03 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:03 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x6, 0x7f}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto(r0, &(0x7f00000001c0)="d0", 0x1, 0x0, 0x0, 0x0) 12:34:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xc739, 0x1210c1) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000040)={0x2}) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000080)={[], 0x6, 0x1, 0x2, 0x0, 0x9, 0xf000, 0x1000, [], 0x5}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000280)={{0x400, 0x7f}, {0x7, 0x80}, 0x8, 0x2, 0x2}) pipe2(&(0x7f0000000340), 0x807fe) 12:34:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getgid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003680), 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$inet(0x2, 0x3, 0x7f) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000400)='gretap0\x00', 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 12:34:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0}, 0x0) 12:34:03 executing program 3: r0 = socket$inet(0x2, 0x3, 0x81) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000840)=[{0xd8, 0x0, 0x0, "9d062e3104445d6c507d0a89461799db474d68a2eabd27583b08e4d205c5612ff10018cfc55592594b930c9ed41b4c34726d577c01106481923752ea53b93c406cf61f88e84c95d3df0e718dd3e62cd7ad0f9e260310d577f4daee991739d72168313447bd261f6e8071aff1f6d11b34f5cec9ed57f2e5b2272c9af3014528173a34bb46810ce71cfa89cc8f6013f5e8e124332b48c919aafa1aebf7a5260cc3e10193573f0f43bcb509bb6565a9ed6e6369680489b1e33aa45c9db2a7baa98d6a3cee1f0692d26d"}], 0xd8}}], 0x1, 0x0) 12:34:03 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 630.303915] *** Guest State *** [ 630.309982] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 630.318914] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 630.340853] CR3 = 0x0000000000000000 [ 630.345024] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 630.374057] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 630.396989] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 12:34:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x7) ioctl$sock_ifreq(r0, 0x893f, &(0x7f0000000000)={'ipd\t@\x00', @ifru_flags=0x4000}) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x80000) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) 12:34:04 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) [ 630.425202] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.442285] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.454229] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.466054] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.476394] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.486515] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.496751] GDTR: limit=0x00000000, base=0x0000000000000000 [ 630.507390] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.517815] IDTR: limit=0x00000000, base=0x0000000000000000 [ 630.540580] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.578949] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 630.592351] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 630.607433] Interruptibility = 00000000 ActivityState = 00000000 [ 630.614515] *** Host State *** [ 630.618123] RIP = 0xffffffff812048fe RSP = 0xffff8881814af390 [ 630.624794] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 630.631413] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 630.640613] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 630.647903] CR0=0000000080050033 CR3=00000001be6f7000 CR4=00000000001426e0 [ 630.663349] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 630.670448] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 630.677103] *** Control State *** [ 630.680970] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 630.688068] EntryControls=0000d3ff ExitControls=002fefff [ 630.694838] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 630.701956] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 630.709034] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 630.716796] reason=80000021 qualification=0000000000000000 [ 630.723361] IDTVectoring: info=00000000 errcode=00000000 [ 630.728908] TSC Offset = 0xfffffeabf3b25c70 [ 630.733383] EPT pointer = 0x00000001c0a8901e [ 630.764694] *** Guest State *** [ 630.768328] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 630.777478] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 630.786542] CR3 = 0x0000000000000000 [ 630.790396] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 630.796598] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 630.802664] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 630.809556] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.817722] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.825917] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.834270] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.842386] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.850588] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.858892] GDTR: limit=0x00000000, base=0x0000000000000000 [ 630.867139] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.875322] IDTR: limit=0x00000000, base=0x0000000000000000 [ 630.883465] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 630.891633] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 630.898187] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 630.905910] Interruptibility = 00000000 ActivityState = 00000000 [ 630.912273] *** Host State *** 12:34:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SG_IO(r0, 0x2285, &(0x7f00000007c0)={0x53, 0x0, 0x66, 0xdf, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000600)="3330cc05bc0692410d1e216c9d8e16aaa5b552bb9a4b987e16163fc0a4dda1460cd54542651d1448bca97a3cbc89f3631f92ddb3499e9ee3f470312a52959e51ffccba654d4c5d6715e9468db8b8d409425ce7cddcaa73e700d5f539f72c0a459a86401aa60f", 0x0, 0x7, 0x10, 0x0, &(0x7f0000000780)}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x110) write$P9_RREADDIR(r1, &(0x7f0000002240)={0x2a, 0x29, 0x2, {0x40, [{{0x2, 0x1, 0x4}, 0x9, 0x0, 0x7, './file0'}]}}, 0x2a) syz_open_dev$sg(0x0, 0x0, 0x800) io_setup(0x6, &(0x7f0000002280)) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f00000021c0)=[{{&(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000009c0)=""/181, 0xb5}, {&(0x7f0000000a80)=""/231, 0xe7}, {&(0x7f0000000b80)=""/219, 0xdb}, {&(0x7f0000000c80)=""/118, 0x76}, {&(0x7f0000000d00)=""/208, 0xd0}, {&(0x7f0000000e00)=""/129, 0x81}, {&(0x7f00000002c0)=""/61, 0x3d}, {&(0x7f0000000ec0)=""/190, 0xbe}], 0x9}, 0x6}, {{&(0x7f0000001000)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/236, 0xec}], 0x1, &(0x7f00000011c0)=""/4096, 0x1000}, 0x5}], 0x2, 0x1be2c126a167f5df, &(0x7f0000002200)) pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000008c0)="00827b2bfdc6a65e491caec37e85b8fec6398416278de27d72886db3f5f3b402aa154f6dd32aeb7feb0bfaa967157581aaff4f621947e0bc91de2cb335f4f14d245003031d41218235542f9111c4ea6b6d3c0a84cc952604d489261f0c16466f76cd9e425cea1586af64a117df7666baadf6764f430581eddaa4213245695720cddc98130255f17854d9b50234d7a4e295e4d1d1e23afe2f922887313c4745c49168012c8b1f5c24219e293b2ddf3b99c0fb806e56d1f7a23a40908746dc8ceb89b29b89165552d07765e1eaaea882f428908eda7526f3ce859df25e511edbf93008dfecc3d6df", 0xe7}], 0x1, 0x0) 12:34:04 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 630.915638] RIP = 0xffffffff812048fe RSP = 0xffff8881814af390 [ 630.921758] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 630.928420] FSBase=00007fc8dac2f700 GSBase=ffff8881dac00000 TRBase=fffffe0000003000 [ 630.936451] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 630.942502] CR0=0000000080050033 CR3=00000001be6f7000 CR4=00000000001426f0 [ 630.958344] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 630.965706] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 630.972180] *** Control State *** [ 630.976353] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 630.983483] EntryControls=0000d3ff ExitControls=002fefff [ 630.989872] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 630.997356] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 631.004817] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 631.011905] reason=80000021 qualification=0000000000000000 [ 631.019664] IDTVectoring: info=00000000 errcode=00000000 [ 631.025817] TSC Offset = 0xfffffeabb4c7e6c0 [ 631.030641] EPT pointer = 0x00000001bcb9801e 12:34:04 executing program 0: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6, 0x6401) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x588c28f2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x224001, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="c40000001d0004062dbd7000fddbdf251f000000520fa78c34490f89b1c07fab7e1a2f4197dc4dcd5778c89a5011f00036d79d7785c5631d6f71cad1f57150fe01c1f06744e5ad02dd6ca85d93e4445477224281b8649e44267358a5a1ca7887e228d1ca7a2d5c13c4c20af381145174a7ec952d13ebe4f48e1e1e2ad3e40c8dc7eb39598fc386bc29c76497f046c8db12d951692b3ee723b3d108002e00", @ANYRES32=r1, @ANYBLOB="d2c817857e950cb90645b1f2fc6e906a33bbaa206ef2eea7b9ce46cc9aa114929153d1"], 0xc4}, 0x1, 0x0, 0x0, 0x4}, 0x1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0xffffffffffffbffc) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$BLKRRPART(r1, 0x125f, 0x0) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240), 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 12:34:04 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) 12:34:04 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:04 executing program 2: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x10000000000001, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000100)=0x10) 12:34:04 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) 12:34:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) ioctl$SG_IO(r0, 0x2285, &(0x7f00000007c0)={0x53, 0x0, 0x66, 0xdf, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000600)="3330cc05bc0692410d1e216c9d8e16aaa5b552bb9a4b987e16163fc0a4dda1460cd54542651d1448bca97a3cbc89f3631f92ddb3499e9ee3f470312a52959e51ffccba654d4c5d6715e9468db8b8d409425ce7cddcaa73e700d5f539f72c0a459a86401aa60f", 0x0, 0x7, 0x10, 0x0, &(0x7f0000000780)}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x110) write$P9_RREADDIR(r1, &(0x7f0000002240)={0x2a, 0x29, 0x2, {0x40, [{{0x2, 0x1, 0x4}, 0x9, 0x0, 0x7, './file0'}]}}, 0x2a) syz_open_dev$sg(0x0, 0x0, 0x800) io_setup(0x6, &(0x7f0000002280)) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f00000021c0)=[{{&(0x7f0000000240)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000800)=""/141, 0x8d}, {&(0x7f00000009c0)=""/181, 0xb5}, {&(0x7f0000000a80)=""/231, 0xe7}, {&(0x7f0000000b80)=""/219, 0xdb}, {&(0x7f0000000c80)=""/118, 0x76}, {&(0x7f0000000d00)=""/208, 0xd0}, {&(0x7f0000000e00)=""/129, 0x81}, {&(0x7f00000002c0)=""/61, 0x3d}, {&(0x7f0000000ec0)=""/190, 0xbe}], 0x9}, 0x6}, {{&(0x7f0000001000)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/236, 0xec}], 0x1, &(0x7f00000011c0)=""/4096, 0x1000}, 0x5}], 0x2, 0x1be2c126a167f5df, &(0x7f0000002200)) pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000008c0)="00827b2bfdc6a65e491caec37e85b8fec6398416278de27d72886db3f5f3b402aa154f6dd32aeb7feb0bfaa967157581aaff4f621947e0bc91de2cb335f4f14d245003031d41218235542f9111c4ea6b6d3c0a84cc952604d489261f0c16466f76cd9e425cea1586af64a117df7666baadf6764f430581eddaa4213245695720cddc98130255f17854d9b50234d7a4e295e4d1d1e23afe2f922887313c4745c49168012c8b1f5c24219e293b2ddf3b99c0fb806e56d1f7a23a40908746dc8ceb89b29b89165552d07765e1eaaea882f428908eda7526f3ce859df25e511edbf93008dfecc3d6df", 0xe7}], 0x1, 0x0) 12:34:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) 12:34:04 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:04 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x2, 0x0, 0xfffffffffffffffd, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:34:04 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) 12:34:05 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002280)={0x0, 0x1a2, &(0x7f0000000000), 0x1, 0x0, 0x0, 0x10}, 0x2) 12:34:05 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:05 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r0, 0x1, 0x1d, 0x0, &(0x7f0000001080)) 12:34:05 executing program 1: syz_emit_ethernet(0x5e, &(0x7f00000003c0)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "871541", 0x28, 0xffffa888, 0x0, @empty, @local, {[], @tipc=@name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}, 0x0) 12:34:05 executing program 3: poll(&(0x7f0000000280)=[{}], 0x1, 0x0) 12:34:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80010002}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040010}, 0x4000000) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) 12:34:05 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:05 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x100000802, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r4, 0x1, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x19}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x536}]}, 0x34}, 0x1, 0x0, 0x0, 0x20040000}, 0x20004015) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f0000000180)) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000200)={0x34, 0x0, &(0x7f00000001c0)}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 12:34:05 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x2000000a}, 0x1c) 12:34:05 executing program 3: poll(&(0x7f0000000280)=[{}], 0x1, 0x0) 12:34:05 executing program 1: r0 = socket$tipc(0x2, 0x2, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id={0x2, 0xb}, 0x10) 12:34:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x1, 0x400, 0x6, 0x4, 0x0, 0x6, 0x20000, 0x4, 0x8, 0x0, 0x100000001, 0x4, 0x1ecb93e, 0x8, 0x800, 0x1, 0x3, 0x7fff, 0x3, 0xff, 0xee, 0x20, 0x8fe, 0x4, 0x6, 0x6, 0x10000, 0x43, 0x6, 0xfffffffffffffffe, 0x0, 0x5, 0x5, 0x2, 0x1000, 0xd93b, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x4000, 0x5, 0xfc00000000000000, 0x1, 0xffffffff, 0x6, 0x19066263}, r1, 0xe, r2, 0xb) [ 631.746727] *** Guest State *** [ 631.766902] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 631.796915] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 631.811025] CR3 = 0x0000000000000000 12:34:05 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:05 executing program 1: r0 = socket$tipc(0x2, 0x2, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id={0x2, 0xb}, 0x10) sendmsg$tipc(r0, &(0x7f00000000c0)={0x0, 0x7, 0x0}, 0x0) 12:34:05 executing program 3: poll(&(0x7f0000000280)=[{}], 0x1, 0x0) [ 631.815436] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 631.823720] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 631.830979] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 631.850137] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xc4b, 0x40181) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000040)={0x2, 0x1}) 12:34:05 executing program 2: r0 = socket$tipc(0xa, 0x4000000080002, 0x0) connect$tipc(r0, &(0x7f0000000040)=@id={0xa}, 0x65) sendmsg$tipc(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)="8f", 0x1, 0x3fe}, 0x0) [ 631.879167] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 631.910529] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:05 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 631.955647] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 631.984279] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 631.992858] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:05 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) [ 632.023790] GDTR: limit=0x00000000, base=0x0000000000000000 [ 632.048216] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.077521] IDTR: limit=0x00000000, base=0x0000000000000000 [ 632.109101] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.120544] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 632.129776] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 632.140769] Interruptibility = 00000000 ActivityState = 00000000 [ 632.147265] *** Host State *** [ 632.150947] RIP = 0xffffffff812048fe RSP = 0xffff888186c77390 [ 632.165402] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 632.172100] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 632.180387] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 632.186446] CR0=0000000080050033 CR3=000000015016f000 CR4=00000000001426e0 [ 632.193494] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 632.200314] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 632.215157] *** Control State *** [ 632.219666] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 632.229331] EntryControls=0000d3ff ExitControls=002fefff [ 632.235417] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 632.243430] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 632.250552] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 632.257515] reason=80000021 qualification=0000000000000000 [ 632.263983] IDTVectoring: info=00000000 errcode=00000000 [ 632.269932] TSC Offset = 0xfffffeab304bd2fc [ 632.274281] EPT pointer = 0x00000001bde6401e [ 632.293185] *** Guest State *** [ 632.297158] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 632.306535] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 632.315913] CR3 = 0x0000000000000000 [ 632.320535] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 632.327860] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 632.333903] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 632.340708] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.348809] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.356883] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.365012] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.373126] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.381158] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.389221] GDTR: limit=0x00000000, base=0x0000000000000000 [ 632.397299] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.405291] IDTR: limit=0x00000000, base=0x0000000000000000 [ 632.413358] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.421413] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 632.428699] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 632.436161] Interruptibility = 00000000 ActivityState = 00000000 [ 632.442602] *** Host State *** [ 632.445827] RIP = 0xffffffff812048fe RSP = 0xffff888186c77390 [ 632.451919] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 632.458392] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 632.466304] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 632.472287] CR0=0000000080050033 CR3=000000015016f000 CR4=00000000001426e0 [ 632.479535] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 632.486207] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 632.492386] *** Control State *** [ 632.495873] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 632.502682] EntryControls=0000d3ff ExitControls=002fefff [ 632.508225] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 632.515295] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 632.522043] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 632.528682] reason=80000021 qualification=0000000000000000 [ 632.535011] IDTVectoring: info=00000000 errcode=00000000 12:34:06 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000000)={0x3, 0x8}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:06 executing program 4: socket$netlink(0x10, 0x3, 0x19) r0 = memfd_create(&(0x7f0000000000)='}!,bdev)\x00', 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000040)=0x30c00801d) 12:34:06 executing program 1: r0 = socket$tipc(0x2, 0x2, 0x0) connect$tipc(r0, &(0x7f0000000000)=@id={0x2, 0xb}, 0x10) sendmsg$tipc(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 12:34:06 executing program 2: syz_execute_func(&(0x7f0000000340)="3666440f50f564ff0941c30f0f441e04a4c4c27d794e0066420fe2e33e0f1110c442019dcc6f") clone(0xb102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(0xffffffffffffffff, r0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000100)={0x3}, 0x8, 0x0) nanosleep(&(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)) 12:34:06 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:06 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) [ 632.541264] TSC Offset = 0xfffffeaae13777d2 [ 632.545603] EPT pointer = 0x00000001cd8d401e 12:34:06 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 12:34:06 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) 12:34:06 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:06 executing program 1: [ 632.765015] *** Guest State *** [ 632.777974] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 12:34:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8400000000018) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x3de, &(0x7f0000000040)}, 0x40005) r1 = memfd_create(&(0x7f00000000c0)='ppp0,wlan1wlan0%}$\x00', 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xd}}, 0x20) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000002c0), &(0x7f0000000300)=0x4) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000380)=0x3, 0x1) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x0, {0xa, 0x4e23, 0x80000000, @mcast1, 0x2}, r2}}, 0x38) setxattr$security_evm(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="210c0000000000007a428600050000"], 0xf, 0x3) ftruncate(r1, 0x96d3) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000340)={0x16, 0xb, &(0x7f0000000000)="b99da805e01cb44a98fa4b"}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r3, 0x4010ae74, &(0x7f0000000080)={0x0, 0x6, 0x1}) 12:34:06 executing program 2: [ 632.816269] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 632.829168] CR3 = 0x0000000000000000 [ 632.845031] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 632.858266] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 632.869577] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 632.898031] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.937098] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.947460] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.979194] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 632.996376] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.005437] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.013849] GDTR: limit=0x00000000, base=0x0000000000000000 [ 633.024554] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.033103] IDTR: limit=0x00000000, base=0x0000000000000000 [ 633.041408] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.049763] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 633.057014] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 633.064665] Interruptibility = 00000000 ActivityState = 00000000 [ 633.070905] *** Host State *** [ 633.074218] RIP = 0xffffffff812048fe RSP = 0xffff88818097f390 [ 633.080252] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 633.086760] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 633.094620] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 633.100608] CR0=0000000080050033 CR3=00000001c10d3000 CR4=00000000001426e0 [ 633.107694] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 633.114478] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 633.120654] *** Control State *** [ 633.124184] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 633.130894] EntryControls=0000d3ff ExitControls=002fefff [ 633.136430] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 633.143526] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 633.150292] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 633.156974] reason=80000021 qualification=0000000000000000 [ 633.163365] IDTVectoring: info=00000000 errcode=00000000 [ 633.168873] TSC Offset = 0xfffffeaaa1f7db8f [ 633.173201] EPT pointer = 0x00000001bddcf01e [ 633.195130] *** Guest State *** [ 633.198481] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 633.207849] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 633.217218] CR3 = 0x0000000000000000 [ 633.221046] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 633.227171] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 633.233284] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 633.240149] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.248318] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.256503] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.264658] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.272658] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.280843] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.289043] GDTR: limit=0x00000000, base=0x0000000000000000 [ 633.297193] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.305366] IDTR: limit=0x00000000, base=0x0000000000000000 [ 633.313467] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 633.321641] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 633.328207] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 633.335920] Interruptibility = 00000000 ActivityState = 00000000 [ 633.342259] *** Host State *** [ 633.345895] RIP = 0xffffffff812048fe RSP = 0xffff8881d7577390 [ 633.351977] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 633.358568] FSBase=00007fc8dabed700 GSBase=ffff8881dac00000 TRBase=fffffe0000003000 [ 633.366717] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 633.372819] CR0=0000000080050033 CR3=00000001c10d3000 CR4=00000000001426f0 [ 633.380108] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 633.386951] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 633.393106] *** Control State *** [ 633.396740] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 633.403571] EntryControls=0000d3ff ExitControls=002fefff [ 633.409227] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 633.416358] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 633.423175] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 633.429945] reason=80000021 qualification=0000000000000000 [ 633.436390] IDTVectoring: info=00000000 errcode=00000000 [ 633.442068] TSC Offset = 0xfffffeaa66095095 12:34:07 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x10, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) 12:34:07 executing program 1: 12:34:07 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:07 executing program 2: 12:34:07 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x165522f3897eaefc) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x5, 0x600400) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) openat$cgroup_ro(r3, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000040)={0x1fe, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$KVM_RUN(r4, 0xae80, 0x0) 12:34:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8009) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000040)={0xae, {0x200, 0x0, 0x2, 0x0, 0x10001, 0x1}}) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000000c0)=""/211) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) [ 633.446548] EPT pointer = 0x00000001bbaf501e 12:34:07 executing program 1: 12:34:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x18004e20, @multicast1}, 0x10) 12:34:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = socket$netlink(0x10, 0x3, 0x1e) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x169}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x40) r3 = dup(r1) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r3, 0x54a3) 12:34:07 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x10, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) 12:34:07 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:07 executing program 1: 12:34:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/52, &(0x7f0000000040)=0x34) 12:34:07 executing program 2: 12:34:07 executing program 1: 12:34:07 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_udp_encap(r3, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) arch_prctl$ARCH_SET_GS(0x1001, 0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) write$P9_RWALK(r0, &(0x7f0000000080)={0x3d, 0x6f, 0x2, {0x4, [{0x8, 0x1, 0x1}, {0x4, 0x2, 0x4}, {0x10, 0x0, 0x1}, {0x8, 0x2, 0x8}]}}, 0x3d) 12:34:07 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x10, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280)=[{}], 0x1, 0x0) 12:34:07 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0x10) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) 12:34:07 executing program 2: 12:34:07 executing program 1: [ 634.046373] *** Guest State *** [ 634.066047] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 12:34:07 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0xfffffffffffffdc2) sendmsg$alg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)="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", 0x1000}], 0x1, &(0x7f00000022c0)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x8}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xdcbb}], 0x1090, 0x40}, 0x20000000) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @remote}, {0x2, 0x4e23, @loopback}, {0x2, 0x4e21, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x78, &(0x7f0000000040)='veth0_to_team\x00', 0x81, 0x1, 0xa00000000}) 12:34:07 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) 12:34:07 executing program 2: [ 634.095231] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 634.120087] CR3 = 0x0000000000000000 12:34:07 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 634.141397] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 634.172054] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 634.195886] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 12:34:07 executing program 1: 12:34:07 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) [ 634.226197] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.255522] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.278174] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.305023] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.326831] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.335481] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.353115] GDTR: limit=0x00000000, base=0x0000000000000000 [ 634.393788] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.409036] IDTR: limit=0x00000000, base=0x0000000000000000 [ 634.422721] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.437104] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 634.443658] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 634.452875] Interruptibility = 00000000 ActivityState = 00000000 [ 634.464439] *** Host State *** [ 634.468937] RIP = 0xffffffff812048fe RSP = 0xffff88807a09f390 [ 634.475529] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 634.482767] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000003000 [ 634.490929] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 634.497575] CR0=0000000080050033 CR3=00000001ce31d000 CR4=00000000001426e0 [ 634.504972] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 634.511659] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 634.518600] *** Control State *** [ 634.522083] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 634.528890] EntryControls=0000d3ff ExitControls=002fefff [ 634.534468] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 634.542132] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 634.548916] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 634.555613] reason=80000021 qualification=0000000000000000 [ 634.561931] IDTVectoring: info=00000000 errcode=00000000 [ 634.568153] TSC Offset = 0xfffffea9f274e065 [ 634.572502] EPT pointer = 0x00000001c163a01e [ 634.588766] *** Guest State *** [ 634.592084] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 634.602213] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 634.611811] CR3 = 0x0000000000000000 [ 634.616136] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 634.622381] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 634.628652] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 634.635410] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.643668] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.651809] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.659981] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.668175] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.676373] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.684443] GDTR: limit=0x00000000, base=0x0000000000000000 [ 634.692687] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.700871] IDTR: limit=0x00000000, base=0x0000000000000000 [ 634.709010] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 634.717261] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 634.723882] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 634.731556] Interruptibility = 00000000 ActivityState = 00000000 [ 634.738007] *** Host State *** [ 634.741355] RIP = 0xffffffff812048fe RSP = 0xffff88818937f390 [ 634.747515] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 634.754050] FSBase=00007fc8dac0e700 GSBase=ffff8881dad00000 TRBase=fffffe0000003000 [ 634.762084] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 634.768513] CR0=0000000080050033 CR3=00000001ce31d000 CR4=00000000001426e0 [ 634.775665] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 634.782513] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 634.788725] *** Control State *** [ 634.792312] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 634.799135] EntryControls=0000d3ff ExitControls=002fefff [ 634.804688] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 634.811809] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 634.818799] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 634.825463] reason=80000021 qualification=0000000000000000 [ 634.832115] IDTVectoring: info=00000000 errcode=00000000 [ 634.837739] TSC Offset = 0xfffffea9a6bcfbf8 12:34:08 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:34:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) getpeername(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) setsockopt$inet_buf(r1, 0x0, 0x11, &(0x7f0000000240)="cdb0a4418034c84c84e04590dca3fa60a849314e8807e8e5495b4ba13a6d097d3e089903ec6c08204122328f9e07c5635174f85f6aa369b08276a21db627ac5ccbba45a9a90c81f977fdeba18f373533af7ce81050a176e05967de27e035776f4a8aa7fc0a5feb2868af913571d9c1f0ca17458f5050d4e99d93cf8934d9e25cce093a83d065ab7b3937aa083848d588beb25fe4ddd3397a8db6053ff8a87d62556e13364e19e61f6a82d186f11e1a64165d83c98fd8914f01cd579efca1a394bafdda78b84571baa8a03a3d2d3de1bb5054ebd541f01a3be2cf0c870460db1cf86de52cfe9546d8", 0xe8) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) clock_gettime(0x0, &(0x7f0000004280)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000004000)=[{{&(0x7f00000000c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)=""/93, 0x5d}], 0x1, &(0x7f0000000380)=""/159, 0x9f}, 0x6}, {{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1, &(0x7f0000001480)=""/245, 0xf5}, 0x3}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001580)=""/172, 0xac}, {&(0x7f0000001640)}], 0x2, &(0x7f00000016c0)=""/59, 0x3b}, 0x9}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001700)=""/192, 0xc0}, {&(0x7f00000017c0)=""/110, 0x6e}, {&(0x7f0000001840)=""/39, 0x27}, {&(0x7f0000001880)=""/122, 0x7a}], 0x4, &(0x7f0000001940)=""/147, 0x93}, 0x3}, {{&(0x7f0000001a00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001a80)=""/36, 0x24}, {&(0x7f0000001ac0)=""/188, 0xbc}, {&(0x7f0000001b80)=""/128, 0x80}, {&(0x7f0000001c00)=""/224, 0xe0}], 0x4, &(0x7f0000001d40)=""/62, 0x3e}, 0x20ab}, {{&(0x7f0000001d80)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001e00)=""/243, 0xf3}, {&(0x7f0000001f00)=""/178, 0xb2}], 0x2, &(0x7f0000002000)=""/139, 0x8b}, 0x9}, {{0x0, 0x0, &(0x7f0000002200)=[{&(0x7f00000020c0)=""/147, 0x93}, {&(0x7f0000002180)=""/74, 0x4a}, {&(0x7f00000022c0)=""/154, 0x9a}], 0x3, &(0x7f0000002380)=""/136, 0x88}, 0xf0a}, {{&(0x7f0000002440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002580)=[{&(0x7f00000024c0)=""/104, 0x68}, {&(0x7f0000002540)}], 0x2, &(0x7f00000025c0)=""/216, 0xd8}, 0xfffffffffffffffb}, {{&(0x7f00000026c0)=@tipc, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002740)=""/124, 0x7c}, {&(0x7f00000027c0)=""/183, 0xb7}, {&(0x7f0000002880)=""/187, 0xbb}, {&(0x7f0000002940)=""/210, 0xd2}, {&(0x7f0000002a40)=""/144, 0x90}, {&(0x7f0000002b00)=""/118, 0x76}, {&(0x7f0000002b80)=""/182, 0xb6}], 0x7, &(0x7f0000002cc0)=""/107, 0x6b}}, {{&(0x7f0000002d40)=@tipc, 0x80, &(0x7f0000003f80)=[{&(0x7f0000002dc0)=""/133, 0x85}, {&(0x7f0000002e80)=""/4096, 0x1000}, {&(0x7f0000003e80)=""/140, 0x8c}, {&(0x7f0000003f40)}], 0x4, &(0x7f0000003fc0)}, 0x9}], 0xa, 0x2, &(0x7f00000042c0)={r2, r3+10000000}) getsockname$tipc(r1, &(0x7f00000001c0)=@id, &(0x7f0000000200)=0x10) 12:34:08 executing program 2: 12:34:08 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:08 executing program 1: 12:34:08 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(0x0, 0x0, 0x0) [ 634.842143] EPT pointer = 0x00000001c359e01e 12:34:08 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:08 executing program 2: 12:34:08 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280), 0x0, 0x0) 12:34:08 executing program 1: 12:34:08 executing program 2: 12:34:08 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280), 0x0, 0x0) 12:34:08 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = dup(r0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 635.313120] *** Guest State *** [ 635.316433] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 635.325953] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 635.335236] CR3 = 0x0000000000000000 [ 635.339065] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 635.345224] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 635.351904] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 635.358797] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.367075] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.375322] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.385103] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.393194] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.401189] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.409316] GDTR: limit=0x00000000, base=0x0000000000000000 [ 635.417488] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.425633] IDTR: limit=0x00000000, base=0x0000000000000000 [ 635.434261] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.442342] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 635.448781] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 635.456334] Interruptibility = 00000000 ActivityState = 00000000 [ 635.462623] *** Host State *** [ 635.465830] RIP = 0xffffffff812048fe RSP = 0xffff888186277390 [ 635.471804] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 635.478305] FSBase=00007fc8dac2f700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 635.486368] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 635.492286] CR0=0000000080050033 CR3=00000001d84e5000 CR4=00000000001426f0 [ 635.499428] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 635.506163] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 635.512230] *** Control State *** [ 635.515827] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 635.522613] EntryControls=0000d3ff ExitControls=002fefff [ 635.528156] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 635.535300] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 635.541967] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 635.548618] reason=80000021 qualification=0000000000000000 [ 635.555032] IDTVectoring: info=00000000 errcode=00000000 [ 635.560503] TSC Offset = 0xfffffea94354ffa5 [ 635.565677] EPT pointer = 0x00000001c162e01e [ 635.586974] *** Guest State *** [ 635.590804] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 635.600622] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 635.609841] CR3 = 0x0000000000000000 [ 635.613825] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 635.619814] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 635.625969] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 635.632647] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.641497] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.649553] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.657607] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.665683] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.673665] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.681719] GDTR: limit=0x00000000, base=0x0000000000000000 [ 635.689740] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 635.698556] IDTR: limit=0x00000000, base=0x0000000000000000 [ 635.706704] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x1f) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0xffffffffffffff5f, &(0x7f0000002240)}, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000001240)=""/190, 0x10f6, 0xbe, 0x1}, 0x20) write$P9_RLINK(r1, &(0x7f0000000140)={0x7, 0x47, 0x1}, 0x7) setsockopt(r0, 0xfffffffffffffff7, 0x3, &(0x7f0000000180)="138c86e01651c07342cda42311b660fdb8c0bd704cdfbeba27af25bcfc14f38be665f793722d2f49a99950e8a4a2c42689e1f7fc708f6a777f05deda50b8645d7885b9d04bd3771308501a500a2485bde25463bf2b4e5fee5715ed4198ff6c4c11a225e214cbcecf040606f61cfd4befc33eae524240d0f2777c885a2540ce9d01a02daf69230617da513287d8013034cce4aac332012efaaa2d90698ae7e0f8fc35eaae092529ee06b302022a553d98", 0xb0) setxattr$security_selinux(&(0x7f0000000080)='.\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:crond_unit_file_t:s0\x00', 0x27, 0x1) 12:34:09 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:09 executing program 2: 12:34:09 executing program 1: 12:34:09 executing program 3: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x200000c, 0x31, 0xffffffffffffffff, 0x0) poll(&(0x7f0000000280), 0x0, 0x0) [ 635.714715] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 635.721109] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 635.728615] Interruptibility = 00000000 ActivityState = 00000000 [ 635.734927] *** Host State *** [ 635.738133] RIP = 0xffffffff812048fe RSP = 0xffff888186277390 [ 635.744124] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 635.750680] FSBase=00007fc8dac2f700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 635.764614] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 635.785570] CR0=0000000080050033 CR3=00000001d84e5000 CR4=00000000001426f0 [ 635.792952] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 635.801340] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 12:34:09 executing program 2: [ 635.813372] *** Control State *** 12:34:09 executing program 1: [ 635.837801] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 635.866623] EntryControls=0000d3ff ExitControls=002fefff 12:34:09 executing program 3: 12:34:09 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x14) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) [ 635.888645] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 12:34:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x62, 0x1) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) [ 635.943345] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 635.979617] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 12:34:09 executing program 1: [ 636.001163] reason=80000021 qualification=0000000000000000 [ 636.022851] IDTVectoring: info=00000000 errcode=00000000 [ 636.042355] TSC Offset = 0xfffffea91e00b59e [ 636.046731] EPT pointer = 0x00000001bf41f01e 12:34:09 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x50, &(0x7f0000000080)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x50, &(0x7f0000000100)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffe1a, 0x0, r0}, 0x2a9) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100000000}, {}, {}, {}, {}, {0x5000}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:09 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x401, 0x101500) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000004}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x44000) r2 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r2, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) 12:34:09 executing program 2: 12:34:09 executing program 3: 12:34:09 executing program 1: 12:34:09 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:09 executing program 3: 12:34:09 executing program 2: 12:34:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000280)=0xfffffffffffffff4) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_route(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_newroute={0x34, 0x18, 0x208, 0x70bd29, 0x25dfdbfb, {0x2, 0x10, 0xb4, 0x68703256, 0xff, 0x7, 0xfe, 0x5, 0x900}, [@RTA_UID={0x8, 0x19, r2}, @RTA_DST={0x8, 0x1, @empty}, @RTA_PREFSRC={0x8, 0x7, @empty}]}, 0x34}, 0x1, 0x0, 0x0, 0x20040800}, 0x24040000) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) 12:34:09 executing program 1: 12:34:09 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:09 executing program 3: [ 636.342993] *** Guest State *** [ 636.346552] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 636.391609] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 636.430661] CR3 = 0x0000000000000000 [ 636.447164] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 636.486205] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 636.501266] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 636.508229] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 636.519783] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 636.528870] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 636.537169] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 636.553501] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 636.563922] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 636.572306] GDTR: limit=0x00000000, base=0x0000000000000000 [ 636.581675] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 636.590380] IDTR: limit=0x00000000, base=0x0000000000005000 [ 636.599326] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 636.608554] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 636.615334] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 636.622961] Interruptibility = 00000000 ActivityState = 00000000 [ 636.629277] *** Host State *** [ 636.632682] RIP = 0xffffffff812048fe RSP = 0xffff8881bf04f390 [ 636.638751] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 636.645371] FSBase=00007fc8dac2f700 GSBase=ffff8881dac00000 TRBase=fffffe0000003000 [ 636.653389] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 636.659391] CR0=0000000080050033 CR3=00000001d94e3000 CR4=00000000001426f0 [ 636.666638] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 636.673662] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 636.679808] *** Control State *** [ 636.683488] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 636.690276] EntryControls=0000d3ff ExitControls=002fefff [ 636.695916] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 636.702984] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 636.709784] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 636.716511] reason=80000021 qualification=0000000000000000 [ 636.723067] IDTVectoring: info=00000000 errcode=00000000 [ 636.728637] TSC Offset = 0xfffffea8b7f064f9 [ 636.733143] EPT pointer = 0x000000015005501e 12:34:10 executing program 1: 12:34:10 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffa0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0xfde, 0x100000001, 0x2, 0x3, 0x8}) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x80) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) shutdown(r2, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {0x0, 0x0, 0xfffffffffffffffe}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:10 executing program 2: 12:34:10 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) 12:34:10 executing program 3: 12:34:10 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:10 executing program 2: 12:34:10 executing program 1: 12:34:10 executing program 3: 12:34:10 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/181) r1 = socket$netlink(0x10, 0x3, 0x9) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000100)=""/188) sendmsg$nl_route(r1, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) 12:34:10 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:10 executing program 2: [ 637.029038] *** Guest State *** [ 637.042425] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 637.079430] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 637.123364] CR3 = 0x0000000000000000 [ 637.136556] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 637.144472] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 637.151867] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 637.162163] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.177746] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.192338] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.207381] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.216490] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.226479] GS: sel=0xfffe, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.234775] GDTR: limit=0x00000000, base=0x0000000000000000 [ 637.244456] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.253097] IDTR: limit=0x00000000, base=0x0000000000000000 [ 637.263798] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.274936] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 637.281820] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 637.290028] Interruptibility = 00000000 ActivityState = 00000000 [ 637.296432] *** Host State *** [ 637.300004] RIP = 0xffffffff812048fe RSP = 0xffff88817fae7390 [ 637.306115] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 637.312722] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 637.320593] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 637.326481] CR0=0000000080050033 CR3=00000001d3450000 CR4=00000000001426e0 [ 637.333571] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 637.340345] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 637.346429] *** Control State *** [ 637.349933] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 637.356601] EntryControls=0000d3ff ExitControls=002fefff [ 637.362118] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 637.369108] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 637.375767] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 637.382405] reason=80000021 qualification=0000000000000000 [ 637.388818] IDTVectoring: info=00000000 errcode=00000000 [ 637.394269] TSC Offset = 0xfffffea85aedb39e [ 637.399495] EPT pointer = 0x000000007610801e [ 637.416973] *** Guest State *** [ 637.420944] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 637.430675] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 637.439611] CR3 = 0x0000000000000000 [ 637.443347] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 637.449441] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 637.455421] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 637.462154] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.470173] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.478138] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.486217] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.494269] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.502364] GS: sel=0xfffe, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.510427] GDTR: limit=0x00000000, base=0x0000000000000000 [ 637.518415] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.526468] IDTR: limit=0x00000000, base=0x0000000000000000 [ 637.534981] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.543031] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 637.549449] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 637.556988] Interruptibility = 00000000 ActivityState = 00000000 [ 637.563293] *** Host State *** [ 637.566492] RIP = 0xffffffff812048fe RSP = 0xffff88817fae7390 [ 637.572549] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 637.578965] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 637.586834] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 637.592760] CR0=0000000080050033 CR3=00000001d3450000 CR4=00000000001426e0 [ 637.599786] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 637.606523] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 637.612651] *** Control State *** [ 637.616098] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 637.622834] EntryControls=0000d3ff ExitControls=002fefff 12:34:11 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:34:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/191, 0xbf}, {&(0x7f00000000c0)=""/229, 0xe5}, {&(0x7f00000001c0)=""/195, 0xc3}, {&(0x7f00000002c0)=""/137, 0x89}, {&(0x7f0000000380)=""/64, 0x40}, {&(0x7f00000003c0)=""/112, 0x70}, {&(0x7f0000000440)=""/53, 0x35}, {&(0x7f0000000480)=""/176, 0xb0}], 0x8) 12:34:11 executing program 3: 12:34:11 executing program 1: 12:34:11 executing program 2: 12:34:11 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) [ 637.628300] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 637.635326] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 637.642056] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 637.648663] reason=80000021 qualification=0000000000000000 [ 637.655031] IDTVectoring: info=00000000 errcode=00000000 [ 637.660485] TSC Offset = 0xfffffea82307080e [ 637.665575] EPT pointer = 0x00000001ceae601e 12:34:11 executing program 3: 12:34:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000580)={'bond0\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket(0x20000000000000a, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bond0\x00', 0xffb}) 12:34:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040)=0x10000, 0x4) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000100), 0x4) 12:34:11 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000240)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept(r0, &(0x7f0000000180)=@generic, &(0x7f0000000040)=0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x64, r2, 0x704, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffbff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40040}, 0x20040000) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) [ 637.866205] *** Guest State *** [ 637.879876] device bond0 entered promiscuous mode [ 637.881460] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 637.890300] device bond_slave_0 entered promiscuous mode [ 637.905756] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 637.910865] 8021q: adding VLAN 0 to HW filter on device bond0 [ 637.915529] CR3 = 0x0000000000000000 [ 637.925180] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 637.933538] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 637.933598] device bond0 left promiscuous mode [ 637.939541] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 637.939555] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.939575] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.939595] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.939613] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.939633] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.939652] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.939665] GDTR: limit=0x00000000, base=0x0000000000000000 [ 637.939691] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 637.946746] device bond_slave_0 left promiscuous mode [ 638.018050] IDTR: limit=0x00000000, base=0x0000000000000000 [ 638.055026] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 638.079463] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 638.101649] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 638.132888] Interruptibility = 00000000 ActivityState = 00000000 [ 638.144450] *** Host State *** [ 638.170104] RIP = 0xffffffff812048fe RSP = 0xffff888185c3f390 [ 638.181301] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 638.193993] FSBase=00007fc8dac2f700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 638.205556] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 638.214449] CR0=0000000080050033 CR3=00000001bd77e000 CR4=00000000001426f0 [ 638.221936] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 638.229597] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 638.236391] *** Control State *** [ 638.240369] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 638.247480] EntryControls=0000d3ff ExitControls=002fefff [ 638.253213] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 638.260510] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 638.267569] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 638.274435] reason=80000021 qualification=0000000000000000 [ 638.281124] IDTVectoring: info=00000000 errcode=00000000 [ 638.286961] TSC Offset = 0xfffffea7e77b37d2 [ 638.291566] EPT pointer = 0x00000000752f401e [ 638.404911] device bond0 entered promiscuous mode [ 638.409877] device bond_slave_0 entered promiscuous mode [ 638.416573] 8021q: adding VLAN 0 to HW filter on device bond0 12:34:12 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = dup(r0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000700)={0x0, 0x8000}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r3, &(0x7f0000000680)={&(0x7f00000001c0)=@ax25={0x3, {"1fdbd2ce652000"}, 0x84d2}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000240)="832300c99d7f48351f6a7bb75e9919cf6c98c1b005eb51ee9cab2b001f6ed32889f6d8343ca585b68e4ba840b2ee01e5c6dab9a7b75cddee39f6f2aaa43abf1413c2d7a75b48e2c7cfcaddfdcfd940eec490c4ba4fd172e9106dabb102bc0330b80d059d0b5f27d403a246e7dccb022fb655422851d6fe95431db4385d497a806f21aedf5865e02aa5be8fb5bcc166caa70324d410ec9cf33d9f2799a5", 0x9d}, {&(0x7f0000000500)="b521cb2d028f46dc8dcb4458bd737bd520c14fa34ef4950530fa1615e9d19fd7ba48f45e33ebbaa9dd9841c9d0c3343ffa50fe2911d23cbc61ce62d5f79bbbca12e290b1bceba8d495722f191631af2fa2395e981b9e74fb48e20843d0ba83dd523ba596b95dfb920aae15a8", 0x6c}], 0x2, &(0x7f0000000580)=[{0x78, 0x11f, 0x81, "27e99f922c1e2b920f0c4c8ea22882963160e0690fa70ab024459c27df0fc9fd785b626adafc01115ed098771939d44d9afdd26f3232bef3b054459954284bdbb73c7d54a9c343a3ad1e9898375f0f348f2eec85d579e6dd94155ef09088e9755b3fa770"}, {0x58, 0xff, 0x1f, "2ce05dcad27a065b57ff47475966937d4747f90745635ffbaf7ee2377b48e8e86e193aed3936f4b1d177020e777c86aa5f98e8cc7494b705703acf930fbac762a819541f9663"}], 0xd0}, 0x2004c004) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0xa, 0xfffffffffffffffe, 0xf, 0x1c, 0x0, 0x70bd2a, 0x25dfdbfe, [@sadb_spirange={0x2, 0x10, 0x4d2, 0x4d6}, @sadb_x_filter={0x5, 0x1a, @in6, @in=@local, 0x7, 0x14, 0x10}, @sadb_sa={0x2, 0x1, 0x4d3, 0xf2e, 0x5, 0xa3, 0x2, 0x40000000}, @sadb_x_policy={0x8, 0x12, 0x0, 0x2, 0x0, 0x6e6bb8, 0x2, {0x6, 0x6c, 0x2, 0x4, 0x0, 0x3, 0x0, @in=@broadcast, @in6=@loopback}}, @sadb_address={0x3, 0x7, 0xff, 0xa0, 0x0, @in={0x2, 0x4e22, @remote}}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e21}, @sadb_x_nat_t_type={0x1, 0x14, 0xfeb8}, @sadb_x_sa2={0x2, 0x13, 0x6, 0x0, 0x0, 0x70bd29, 0x3500}, @sadb_ident={0x2, 0x4ac0b11bff66d313, 0xf4d3, 0x0, 0x1}]}, 0xe0}}, 0x4000) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r6, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x349000, 0x0) [ 638.539780] *** Guest State *** [ 638.543119] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 638.552307] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 638.561213] CR3 = 0x0000000000000000 [ 638.564964] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 638.571025] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 638.577007] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 12:34:12 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0xff7f) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000100)={0x0, 0x7, 0x80, 0x0, 'syz1\x00', 0xf6}) write$9p(r0, &(0x7f0000000340)="26b099e19530314f2d7e975d4455d4efd5c9cfc6e4ca788aac2fec9a32f47611ac24368a554bc23f70a20007db61649e2aea6317175067115420a10377560b6e9e2410a4bb09e9dda22a3c9e85be5b4518ebdbb3536141fe72ddc7904c6ba73d956d2321544894c328e1798da70f5c847cc5b7483380dd68e4959e89c11bf8d3703a7070db00758c69aca0eac2fe18353481983fd2f0af0a2ba1db0f0000000000006082a164a42ea5310339b45e5917cd9de8b4140307b22fd6bb00000000000000000000000000000000000000000000", 0xd1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_to_bond\x00', @ifru_settings={0x6, 0x200, @fr=&(0x7f0000000040)={0x9, 0x8, 0xe40, 0x9, 0x1, 0x3, 0x6}}}}) fsetxattr$security_smack_transmute(r0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x2) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r1, &(0x7f0000002280)={0x0, 0xffffffc4, &(0x7f0000000300)={0x0, 0xb6c93a9bf1831b16}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 12:34:12 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xf000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r3, 0x0, 0xf}}, 0x1c}}, 0x0) 12:34:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x1, 0x8000, 0x20}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000)="c732196c6d", 0x0}, 0x18) [ 638.585803] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 638.593998] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 638.602370] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 638.617808] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 638.628904] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 638.638013] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 638.646539] GDTR: limit=0x00000000, base=0x0000000000000000 [ 638.662889] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:12 executing program 1: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) 12:34:12 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x7) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xff, 0x40000) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)={0x54, 0x7, 0x9, {0x9, 0x3}, {0x0, 0x4}, @rumble={0x3a7}}) sendmsg$nl_route(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)}, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'ifb0\x00', 0x0}) accept(r1, &(0x7f0000000200)=@can={0x1d, 0x0}, &(0x7f0000000280)=0x80) accept$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14, 0x80800) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000540)={@mcast1, 0x0}, &(0x7f0000000580)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000005c0)={0x158, r2, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8, 0x1, r6}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6700000000}}, {0x8, 0x6, r7}}}]}}]}, 0x158}, 0x1, 0x0, 0x0, 0x1}, 0x4010) 12:34:12 executing program 2: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)) [ 638.704218] IDTR: limit=0x00000000, base=0x0000000000000000 [ 638.715179] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 638.727011] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 638.734338] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 638.752340] Interruptibility = 00000000 ActivityState = 00000000 [ 638.759129] *** Host State *** [ 638.762698] RIP = 0xffffffff812048fe RSP = 0xffff88817fae7390 [ 638.790553] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 638.822771] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 638.852140] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 12:34:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000380)={{0x0, 0x0, r1}}) 12:34:12 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) munlock(&(0x7f0000ff8000/0x4000)=nil, 0x4000) 12:34:12 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) [ 638.877542] CR0=0000000080050033 CR3=00000001bd77e000 CR4=00000000001426e0 [ 638.911959] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 638.951907] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 638.993689] *** Control State *** [ 639.004936] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 639.017706] EntryControls=0000d3ff ExitControls=002fefff [ 639.039388] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 639.054026] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 639.060945] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 639.067952] reason=80000021 qualification=0000000000000000 [ 639.075360] IDTVectoring: info=00000000 errcode=00000000 [ 639.081367] TSC Offset = 0xfffffea7892cf314 [ 639.086329] EPT pointer = 0x00000001c495e01e 12:34:12 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffe94, &(0x7f0000002240)={0x0, 0xfffffffffffffd8c}}, 0xfffffffffffffffb) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000340)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000500)={0x0, @loopback, @multicast1}, &(0x7f0000000540)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000580)={{{@in=@multicast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'ip6gre0\x00', 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)=""/228, 0xe4}, {&(0x7f0000000880)=""/24, 0x18}, {&(0x7f00000008c0)=""/54, 0x36}, {&(0x7f0000000900)=""/194, 0xc2}], 0x4, &(0x7f0000000a40)=""/205, 0xcd}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001f80)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000002100)={@dev, @local, 0x0}, &(0x7f0000002140)=0xc) recvmmsg(0xffffffffffffff9c, &(0x7f0000003980)=[{{&(0x7f0000003280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000003500)=[{&(0x7f0000003300)=""/34, 0x22}, {&(0x7f0000003340)=""/160, 0xa0}, {&(0x7f0000003400)=""/212, 0xd4}], 0x3, &(0x7f0000003540)=""/76, 0x4c}, 0x2}, {{&(0x7f00000035c0)=@nfc_llcp, 0x80, &(0x7f00000038c0)=[{&(0x7f0000003640)=""/185, 0xb9}, {&(0x7f0000003700)=""/253, 0xfd}, {&(0x7f0000003800)=""/138, 0x8a}], 0x3, &(0x7f0000003900)=""/81, 0x51}, 0x9}], 0x2, 0x40000000, &(0x7f0000003a00)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1ee20170b1de22fd, &(0x7f0000003a80)={@multicast2, @broadcast, 0x0}, &(0x7f0000003ac0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003b00)={'bond_slave_1\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c80)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000003d80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000003dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003e00)=0x14, 0x80000) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000004480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10006150}, 0xc, &(0x7f0000004440)={&(0x7f0000003e40)={0x5fc, r1, 0x10, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0xb4, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7a}}}]}}, {{0x8, 0x1, r4}, {0x290, 0x2, [{0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0xb9, 0x2, 0x8, 0x101}, {0x400, 0x6, 0xfffffffffffffffd, 0x2}, {0x5bf14a45, 0xff, 0x9}, {0x80000001, 0x3, 0x6, 0x2d28}, {0xfffffffffffffffa, 0x1f, 0x101, 0x8}, {0x20, 0xfffffffffffff800, 0xffffffffffffff01, 0x5}, {0x80, 0x5ec6, 0x100, 0x4}, {0x10001, 0xffff, 0xfffffffffffffffe, 0x200}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x1, 0x4, 0x10000, 0x1}, {0x4, 0x5, 0xfffffffffffffffa, 0x8}, {0x100, 0x7, 0x4, 0x100000001}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xcf}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x7, 0x1, 0x90, 0x6}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0xf0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x148, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xca}}, {0x8, 0x6, r12}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffe0}}, {0x8, 0x6, r15}}}]}}]}, 0x5fc}, 0x1, 0x0, 0x0, 0x4000000}, 0x8001) 12:34:12 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x10, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x8010) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:12 executing program 1: perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/20) 12:34:12 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800100000003) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000a00000000000000ff020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000fe8000000000000000000000000000aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008ba2298e965a9ef0b2a3111a31269cd7dcf39ee7db6790c4f4a91e5bd78a"], 0x1) 12:34:12 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000400)={@void, @val={0x1}, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x18, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @dev}}}}}, 0x4a) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, 0x0) 12:34:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=@getroute={0x14, 0x1a, 0x1c974209d04c2781}, 0x14}}, 0x0) 12:34:12 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") write$binfmt_elf32(r0, 0x0, 0x0) 12:34:12 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 639.251443] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 639.282337] 8021q: adding VLAN 0 to HW filter on device team0 12:34:12 executing program 4: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @local, 0x0, 0x1, [@remote]}, 0x14) close(r0) [ 639.315474] IPv6: ADDRCONF(NETDEV_UP): bond_slave_1: link is not ready [ 639.413562] *** Guest State *** [ 639.421321] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond.0: link is not ready [ 639.435786] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 639.449706] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready 12:34:13 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 639.458670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond.0: link becomes ready [ 639.468494] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 639.484912] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 639.492333] CR3 = 0x0000000000000000 [ 639.499125] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 639.505481] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 639.511881] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 12:34:13 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000080)="edd008000000000019a6515592000012ac6a612e2ae6d0e5dafb50c31fa76fa9d5428dfc7246c4e2811e305d46", 0x2d, 0x8000, 0x0, 0x0) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)=""/96, 0x60}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") sendto$inet(r0, &(0x7f0000000000)="dde20f100fc1c79a93edf7e95ad2a3ceb954bf7b28df4f7b", 0x18, 0x0, 0x0, 0x0) [ 639.532687] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 639.553707] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 639.562037] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 639.570558] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 639.579072] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:13 executing program 3: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000380)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}) [ 639.608977] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 639.641165] GDTR: limit=0x00000000, base=0x0000000000000000 [ 639.670572] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 639.688833] IDTR: limit=0x00000000, base=0x0000000000000000 [ 639.696948] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 639.718884] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 639.738587] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 639.752345] Interruptibility = 00000000 ActivityState = 00000000 [ 639.761813] *** Host State *** [ 639.766705] RIP = 0xffffffff812048fe RSP = 0xffff88817fcc7390 [ 639.775923] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 639.784336] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000003000 [ 639.795802] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 639.802699] CR0=0000000080050033 CR3=00000001b8acf000 CR4=00000000001426e0 [ 639.825584] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 639.834805] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 639.842031] *** Control State *** [ 639.846078] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 639.853781] EntryControls=0000d3ff ExitControls=002fefff [ 639.860104] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 639.871506] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 639.878811] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 639.886701] reason=80000021 qualification=0000000000000000 [ 639.893806] IDTVectoring: info=00000000 errcode=00000000 [ 639.899913] TSC Offset = 0xfffffea714815430 [ 639.904941] EPT pointer = 0x00000001cb8ce01e 12:34:13 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x100, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000180)={0x48, &(0x7f0000000100)="8def07f0593447d2c9c83478fb44eca9287210be7f135defc5ed1abed79139b896cbaf1df782b5c3812b337e7881b695bdec270a459cd9442ee0eea8e9ae765c881855f557ec30a3"}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101700, 0x0) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000080)=0xe4) r4 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)={0x1c0, r6, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth0\x00'}}]}, @TIPC_NLA_LINK={0xec, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9644}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x62e0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x32}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x94}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80dd}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f00000001c0)=""/222) 12:34:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000080)={0x1, 0x0, [{0xffff, 0x0, 0x0, 0x0, @adapter}]}) 12:34:13 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:13 executing program 4: getgroups(0x2, &(0x7f0000000280)=[0x0, 0xee00]) setregid(0x0, r0) [ 640.092989] *** Guest State *** [ 640.101092] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 640.121225] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 640.142131] CR3 = 0x0000000000000000 [ 640.154319] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 640.170018] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 640.183126] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 640.197907] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.219671] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.252473] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.260743] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.270078] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.278890] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.288699] GDTR: limit=0x00000000, base=0x0000000000000000 [ 640.297974] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.307979] IDTR: limit=0x00000000, base=0x0000000000000000 [ 640.316755] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.338162] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 640.355280] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 640.369014] Interruptibility = 00000000 ActivityState = 00000000 [ 640.375453] *** Host State *** [ 640.378758] RIP = 0xffffffff812048fe RSP = 0xffff88818937f390 [ 640.384975] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 640.391485] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 640.399450] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 640.405491] CR0=0000000080050033 CR3=00000001c1588000 CR4=00000000001426e0 [ 640.412605] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 640.419448] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 640.425684] *** Control State *** [ 640.429300] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 640.436191] EntryControls=0000d3ff ExitControls=002fefff [ 640.442287] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 640.442298] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 640.442308] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 640.442316] reason=80000021 qualification=0000000000000000 [ 640.442325] IDTVectoring: info=00000000 errcode=00000000 [ 640.442332] TSC Offset = 0xfffffea6b6cbf167 [ 640.442343] EPT pointer = 0x000000009ff3201e [ 640.497814] *** Guest State *** 12:34:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000540)="2f65786500000000000409004bdd070000a4d119698f1c12750f798058439ed554fa07424adee901d2da75cb85b4b7a1350588743c8d9baf1f02acc7edbcd7a071fb35331ce39c5a8b0bd6dcaf21bc211317ffef33867ccc5b8f1439b56d341662bc8880979843b3355236be93426485f99f87998f48ad7ffa29bda080d701b70d252407218fad612e074583416711ec1053ba40f26809a95171a9") fsetxattr(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='user.['], 0x0, 0x0, 0x0) 12:34:14 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000040)) 12:34:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x77, 0x0, [0x40000002]}) 12:34:14 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, 0x0, &(0x7f0000000280)}, 0x20) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f8, &(0x7f0000000180)={'sit0\x00', @ifru_flags}) [ 640.501267] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 640.516710] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 640.527648] CR3 = 0x0000000000000000 [ 640.531726] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 640.538868] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 640.546521] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 640.556747] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.565883] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.576042] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:14 executing program 4: [ 640.605837] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.618490] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.643152] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.653162] GDTR: limit=0x00000000, base=0x0000000000000000 [ 640.665997] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.674009] IDTR: limit=0x00000000, base=0x0000000000000000 12:34:14 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:14 executing program 2: [ 640.716181] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 640.727139] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 640.734623] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 640.783167] Interruptibility = 00000000 ActivityState = 00000000 [ 640.799666] *** Host State *** [ 640.806350] RIP = 0xffffffff812048fe RSP = 0xffff88818937f390 [ 640.824866] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 640.831501] FSBase=00007fc8dac2f700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 640.848369] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 640.855146] CR0=0000000080050033 CR3=00000001c1588000 CR4=00000000001426f0 [ 640.864195] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 640.871155] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 640.877459] *** Control State *** [ 640.881073] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 640.889277] EntryControls=0000d3ff ExitControls=002fefff [ 640.896397] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 640.904803] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 12:34:14 executing program 4: 12:34:14 executing program 1: 12:34:14 executing program 3: 12:34:14 executing program 2: 12:34:14 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000380)={0x0, @rand_addr, @broadcast}, &(0x7f0000001500)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000001540)={'vcan0\x00', r4}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, {}, {0x0, 0x0, 0x1b}, {0x0, 0x10000}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64MMAP\x00', &(0x7f0000000100)='$-)bdev@\x00', 0x9, 0x3) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0xded4) 12:34:14 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 640.930488] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 640.937127] reason=80000021 qualification=0000000000000000 [ 640.944435] IDTVectoring: info=00000000 errcode=00000000 [ 640.950538] TSC Offset = 0xfffffea67d5b9384 [ 640.954954] EPT pointer = 0x000000017591201e 12:34:14 executing program 1: 12:34:14 executing program 2: 12:34:14 executing program 4: 12:34:14 executing program 3: 12:34:14 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 641.162571] *** Guest State *** [ 641.165906] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 641.202082] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 12:34:14 executing program 2: 12:34:14 executing program 3: 12:34:14 executing program 1: 12:34:14 executing program 4: [ 641.211892] CR3 = 0x0000000000000000 [ 641.215787] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 641.222552] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 641.228732] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 641.236915] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:14 executing program 3: [ 641.311736] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.345460] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.382039] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.406047] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.433222] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.454276] GDTR: limit=0x00000000, base=0x0000000000000000 [ 641.463512] LDTR: sel=0x0000, attr=0x10000, limit=0x00010000, base=0x0000000000000000 [ 641.471661] IDTR: limit=0x00000000, base=0x0000000000000000 [ 641.480118] TR: sel=0x001b, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.480131] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 641.495390] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 641.504629] Interruptibility = 00000000 ActivityState = 00000000 [ 641.510885] *** Host State *** [ 641.515705] RIP = 0xffffffff812048fe RSP = 0xffff888184547390 [ 641.521683] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 641.528177] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 641.536055] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 641.541961] CR0=0000000080050033 CR3=00000001c5039000 CR4=00000000001426e0 [ 641.549081] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 641.556310] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 641.562357] *** Control State *** [ 641.565891] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 641.572568] EntryControls=0000d3ff ExitControls=002fefff [ 641.578260] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 641.585262] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 641.591940] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 641.598726] reason=80000021 qualification=0000000000000000 [ 641.605164] IDTVectoring: info=00000000 errcode=00000000 [ 641.610637] TSC Offset = 0xfffffea626068831 [ 641.615899] EPT pointer = 0x00000001d66cb01e [ 641.636529] *** Guest State *** [ 641.640806] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 641.650057] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 641.659045] CR3 = 0x0000000000000000 [ 641.662780] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 641.668848] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 641.674987] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 641.681668] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.690409] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.698487] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.706506] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.714542] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.722534] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.730556] GDTR: limit=0x00000000, base=0x0000000000000000 [ 641.738574] LDTR: sel=0x0000, attr=0x10000, limit=0x00010000, base=0x0000000000000000 [ 641.746668] IDTR: limit=0x00000000, base=0x0000000000000000 [ 641.755053] TR: sel=0x001b, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 641.763075] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 641.771251] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 641.778795] Interruptibility = 00000000 ActivityState = 00000000 [ 641.785061] *** Host State *** [ 641.788261] RIP = 0xffffffff812048fe RSP = 0xffff888184547390 [ 641.794255] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 641.800740] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 641.808621] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 641.814499] CR0=0000000080050033 CR3=00000001c5039000 CR4=00000000001426e0 [ 641.821581] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 641.828324] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 641.834371] *** Control State *** [ 641.838042] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 641.844765] EntryControls=0000d3ff ExitControls=002fefff [ 641.850328] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 641.857897] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 641.864568] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 641.871274] reason=80000021 qualification=0000000000000000 [ 641.877629] IDTVectoring: info=00000000 errcode=00000000 [ 641.883064] TSC Offset = 0xfffffea5e0e065ae 12:34:15 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000080)={0x101, 0x2, 0x6}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000000c0)={[0x3, 0x23d, 0x5, 0x3, 0x81f, 0x8001, 0x1, 0x4, 0xce, 0x3, 0x2, 0x9, 0x7fff, 0x4, 0x4, 0x5], 0x5002, 0x140300}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 641.887453] EPT pointer = 0x00000001d3a0c01e 12:34:15 executing program 2: 12:34:15 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:15 executing program 4: 12:34:15 executing program 1: 12:34:15 executing program 3: 12:34:15 executing program 1: 12:34:15 executing program 4: 12:34:15 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:15 executing program 2: 12:34:15 executing program 3: 12:34:15 executing program 1: [ 642.145060] *** Guest State *** [ 642.152144] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 642.187008] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 642.198047] CR3 = 0x0000000000000000 [ 642.209340] RSP = 0x0000000000000001 RIP = 0x0000000000005002 [ 642.216230] RFLAGS=0x00140302 DR7 = 0x0000000000000400 [ 642.223373] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 642.231286] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.266596] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.279553] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.296414] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.304913] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.319084] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.328996] GDTR: limit=0x00000000, base=0x0000000000000000 [ 642.337131] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.345481] IDTR: limit=0x00000000, base=0x0000000000000000 [ 642.354181] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.362476] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 642.368902] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 642.376471] Interruptibility = 00000000 ActivityState = 00000000 [ 642.382777] *** Host State *** [ 642.385992] RIP = 0xffffffff812048fe RSP = 0xffff8881d7577390 [ 642.392102] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 642.398517] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 642.406486] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 642.412477] CR0=0000000080050033 CR3=00000001be1ad000 CR4=00000000001426e0 [ 642.419508] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 642.426255] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 642.432884] *** Control State *** [ 642.436336] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 642.443070] EntryControls=0000d3ff ExitControls=002fefff [ 642.448564] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 642.456197] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 642.462965] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 642.469547] reason=80000021 qualification=0000000000000000 [ 642.475941] IDTVectoring: info=00000000 errcode=00000000 [ 642.481451] TSC Offset = 0xfffffea5a00947c2 [ 642.485794] EPT pointer = 0x00000001cde7801e [ 642.508270] *** Guest State *** [ 642.511783] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 642.521321] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 642.530165] CR3 = 0x0000000000000000 [ 642.534011] RSP = 0x0000000000000001 RIP = 0x0000000000005002 [ 642.540034] RFLAGS=0x00140302 DR7 = 0x0000000000000400 [ 642.546143] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 642.552889] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.560885] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.560904] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.560921] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.577065] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.594063] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.602143] GDTR: limit=0x00000000, base=0x0000000000000000 [ 642.610160] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.618260] IDTR: limit=0x00000000, base=0x0000000000000000 [ 642.626309] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 642.634378] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 642.640789] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 642.648452] Interruptibility = 00000000 ActivityState = 00000000 [ 642.654802] *** Host State *** [ 642.658016] RIP = 0xffffffff812048fe RSP = 0xffff8881877ef390 [ 642.664089] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 642.670637] FSBase=00007fc8dac0e700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 642.678510] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 642.684471] CR0=0000000080050033 CR3=00000001be1ad000 CR4=00000000001426f0 [ 642.691495] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 642.698231] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 642.704344] *** Control State *** [ 642.707789] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 642.714515] EntryControls=0000d3ff ExitControls=002fefff 12:34:16 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000000c0)={0x7ff, 0x8, 0x100000001, 0x3f0000}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x44080, 0x0) write$input_event(r1, &(0x7f0000000080)={{0x77359400}, 0x3, 0x5, 0x10001}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x3, 0x8bb, 0x1, 0x0, 0x1f, 0x4000, 0x8, 0x20d4, 0x0, 0x6a, 0x5, 0x4, 0x5, 0x2, 0x0, 0x2, 0x3, 0x2, 0x100000001, 0x81, 0x1f, 0xfffffffffffffffe, 0x5, 0x6, 0x2, 0x100, 0x2, 0x3ff, 0x10001, 0x1, 0xfff, 0x0, 0x0, 0x100, 0x8, 0x0, 0x3, 0x1, @perf_config_ext={0x9d, 0x8}, 0x10000, 0x825e, 0x5d, 0x7, 0x8, 0x80000000, 0x7}, r2, 0xffffffffffffffff, 0xffffffffffffff9c, 0x8) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 12:34:16 executing program 4: 12:34:16 executing program 2: 12:34:16 executing program 3: 12:34:16 executing program 1: 12:34:16 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 642.719981] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 642.727650] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 642.734399] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 642.740985] reason=80000021 qualification=0000000000000000 [ 642.747412] IDTVectoring: info=00000000 errcode=00000000 [ 642.752874] TSC Offset = 0xfffffea568ebf1f3 [ 642.757309] EPT pointer = 0x000000018712201e 12:34:16 executing program 4: 12:34:16 executing program 1: 12:34:16 executing program 3: 12:34:16 executing program 2: 12:34:16 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 642.941400] *** Guest State *** [ 642.947882] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 12:34:16 executing program 4: [ 643.012204] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 643.058899] CR3 = 0x0000000000000000 [ 643.066016] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 643.079621] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 643.090057] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 643.109267] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.131937] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.161200] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.177336] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.185507] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.194458] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.203351] GDTR: limit=0x00000000, base=0x0000000000000000 [ 643.212001] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.220935] IDTR: limit=0x00000000, base=0x0000000000000000 [ 643.229356] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.237622] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 643.244352] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 643.252124] Interruptibility = 00000000 ActivityState = 00000000 [ 643.258487] *** Host State *** [ 643.261808] RIP = 0xffffffff812048fe RSP = 0xffff8881877ef390 [ 643.268205] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 643.275528] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000003000 [ 643.284227] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 643.290370] CR0=0000000080050033 CR3=000000017e5d9000 CR4=00000000001426e0 [ 643.297592] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 643.304350] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 643.310598] *** Control State *** [ 643.314139] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 643.320993] EntryControls=0000d3ff ExitControls=002fefff [ 643.326611] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 643.333750] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 643.340590] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 643.347305] reason=80000021 qualification=0000000000000000 [ 643.353863] IDTVectoring: info=00000000 errcode=00000000 [ 643.359607] TSC Offset = 0xfffffea52f5e2767 [ 643.364051] EPT pointer = 0x000000007a81401e [ 643.381786] *** Guest State *** [ 643.385203] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 643.394469] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 643.403629] CR3 = 0x0000000000000000 [ 643.407439] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 643.413627] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 643.419877] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 643.426692] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.434896] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.443142] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.451377] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.459567] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.467800] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.476222] GDTR: limit=0x00000000, base=0x0000000000000000 [ 643.484657] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.492875] IDTR: limit=0x00000000, base=0x0000000000000000 [ 643.501059] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 643.509372] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 643.515920] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 643.523642] Interruptibility = 00000000 ActivityState = 00000000 [ 643.530565] *** Host State *** [ 643.533891] RIP = 0xffffffff812048fe RSP = 0xffff888186e77390 [ 643.540093] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 643.546657] FSBase=00007fc8dac0e700 GSBase=ffff8881dac00000 TRBase=fffffe0000003000 [ 643.554668] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 643.560736] CR0=0000000080050033 CR3=000000017e5d9000 CR4=00000000001426f0 [ 643.567957] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 643.574859] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 643.581101] *** Control State *** [ 643.584654] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 643.591533] EntryControls=0000d3ff ExitControls=002fefff [ 643.597191] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 643.604345] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 12:34:17 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000000)) 12:34:17 executing program 3: 12:34:17 executing program 2: 12:34:17 executing program 1: 12:34:17 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:17 executing program 4: [ 643.611328] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 643.618069] reason=80000021 qualification=0000000000000000 [ 643.624624] IDTVectoring: info=00000000 errcode=00000000 [ 643.630175] TSC Offset = 0xfffffea4f1396bfd [ 643.634714] EPT pointer = 0x00000001c0e2a01e 12:34:17 executing program 2: 12:34:17 executing program 1: 12:34:17 executing program 4: 12:34:17 executing program 3: 12:34:17 executing program 2: 12:34:17 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 643.879297] *** Guest State *** [ 643.887730] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 643.903358] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 643.927811] CR3 = 0x0000000000000000 [ 643.932265] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 643.970067] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 644.000105] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 644.020135] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.029356] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.037714] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.047128] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.055833] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.064265] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.081536] GDTR: limit=0x00000000, base=0x0000000000000000 [ 644.090466] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.099736] IDTR: limit=0x00000000, base=0x0000000000000000 [ 644.108118] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.116908] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 644.124185] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 644.131950] Interruptibility = 00000000 ActivityState = 00000000 [ 644.138417] *** Host State *** [ 644.141637] RIP = 0xffffffff812048fe RSP = 0xffff8881816a7390 [ 644.147746] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 644.154215] FSBase=00007fc8dac0e700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 644.162187] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 644.168167] CR0=0000000080050033 CR3=00000001c537d000 CR4=00000000001426f0 [ 644.176150] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 644.183138] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 644.189745] *** Control State *** [ 644.193277] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 644.200131] EntryControls=0000d3ff ExitControls=002fefff [ 644.205727] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 644.212693] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 12:34:17 executing program 1: 12:34:17 executing program 3: 12:34:17 executing program 4: 12:34:17 executing program 2: 12:34:17 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'eql\x00'}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x0, "522e70ecc7ca93a8"}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x10000, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f00000000c0)) syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r4, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r4, 0xae80, 0x0) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) 12:34:17 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 644.219468] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 644.226099] reason=80000021 qualification=0000000000000000 [ 644.232414] IDTVectoring: info=00000000 errcode=00000000 [ 644.237978] TSC Offset = 0xfffffea4b3559aef [ 644.242328] EPT pointer = 0x00000001d1d1701e 12:34:17 executing program 1: 12:34:17 executing program 2: 12:34:17 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(0xffffffffffffffff, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:17 executing program 4: 12:34:17 executing program 3: 12:34:18 executing program 3: 12:34:18 executing program 4: 12:34:18 executing program 1: 12:34:18 executing program 2: 12:34:18 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r1) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r0, r3, &(0x7f0000d83ff8), 0x8000fffffffe) [ 644.737275] *** Guest State *** [ 644.746851] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 644.771488] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 644.819878] CR3 = 0x0000000000000000 [ 644.834030] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 644.846545] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 644.855383] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 644.862457] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.880977] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.905199] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.927951] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.941463] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.949750] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.958193] GDTR: limit=0x00000000, base=0x0000000000000000 [ 644.967700] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.979716] IDTR: limit=0x00000000, base=0x0000000000000000 [ 644.988881] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 644.997733] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 645.004507] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 645.012240] Interruptibility = 00000000 ActivityState = 00000000 [ 645.018784] *** Host State *** [ 645.022216] RIP = 0xffffffff812048fe RSP = 0xffff8881877ef390 [ 645.028336] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 645.035095] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000003000 [ 645.043134] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 645.049118] CR0=0000000080050033 CR3=00000001bc1de000 CR4=00000000001426e0 [ 645.056398] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 645.063978] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 645.070164] *** Control State *** [ 645.073875] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 645.080728] EntryControls=0000d3ff ExitControls=002fefff [ 645.086447] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 645.093643] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 645.100459] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 645.107293] reason=80000021 qualification=0000000000000000 [ 645.113918] IDTVectoring: info=00000000 errcode=00000000 [ 645.119528] TSC Offset = 0xfffffea43a1477fd [ 645.124126] EPT pointer = 0x00000001c42ee01e [ 645.147049] *** Guest State *** [ 645.150593] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 645.159577] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 645.168501] CR3 = 0x0000000000000000 [ 645.172228] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 645.178460] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 645.184522] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 645.191219] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.199291] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.207347] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.215437] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.224309] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.232292] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.240377] GDTR: limit=0x00000000, base=0x0000000000000000 [ 645.248399] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.256525] IDTR: limit=0x00000000, base=0x0000000000000000 [ 645.264590] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.272569] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 645.279094] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 645.286608] Interruptibility = 00000000 ActivityState = 00000000 [ 645.286614] *** Host State *** [ 645.286628] RIP = 0xffffffff812048fe RSP = 0xffff888180587390 [ 645.286651] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 645.286663] FSBase=00007fc8dabed700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 645.286675] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 645.286690] CR0=0000000080050033 CR3=00000001bc1de000 CR4=00000000001426e0 [ 645.286705] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 645.286718] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 645.286723] *** Control State *** [ 645.286731] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 645.286739] EntryControls=0000d3ff ExitControls=002fefff [ 645.286765] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 645.365262] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 645.372033] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 645.378702] reason=80000021 qualification=0000000000000000 [ 645.385076] IDTVectoring: info=00000000 errcode=00000000 [ 645.390533] TSC Offset = 0xfffffea3ff2d21c2 12:34:18 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getsockname$netlink(r2, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000007115e000000000009500000000000000"], 0x0, 0x80, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 12:34:18 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1638dc95) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) poll(&(0x7f0000000040)=[{r3}], 0x1, 0x0) 12:34:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 12:34:18 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000200)="240000005e0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000004280)={0x0, 0x0, 0x0}, 0x0) [ 645.394937] EPT pointer = 0x00000001bbf3801e 12:34:18 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:19 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000140)=0x100000000002, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_emit_ethernet(0x1e, &(0x7f0000000100)={@broadcast, @remote, [], {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "199ac0f1ca9a7443"}}}}, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "10d1f6", 0x0, "071ccd"}}}}}}, 0x0) 12:34:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300090468fe0704000000000000ff3f03000000450001070000001419001a0015000a00070008000200000800005d14a4e91ee438", 0x39}], 0x1) 12:34:19 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 645.586274] *** Guest State *** [ 645.595304] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 645.616940] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 645.637901] CR3 = 0x0000000000000000 [ 645.646299] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 645.657264] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 645.665058] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 645.670530] netlink: 'syz-executor1': attribute type 8 has an invalid length. [ 645.678455] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:19 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 645.680108] netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'. [ 645.694901] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.696877] netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'. [ 645.712546] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.724029] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.732773] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.751411] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.765515] GDTR: limit=0x00000000, base=0x0000000000000000 [ 645.774446] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:19 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) [ 645.783018] IDTR: limit=0x00000000, base=0x0000000000000000 [ 645.795953] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 645.807841] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 645.817844] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 645.827915] Interruptibility = 00000000 ActivityState = 00000000 [ 645.834735] *** Host State *** [ 645.838194] RIP = 0xffffffff812048fe RSP = 0xffff888186e77390 [ 645.845621] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 645.859327] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 645.871379] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 645.877446] CR0=0000000080050033 CR3=00000001bec2c000 CR4=00000000001426e0 12:34:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000800)={'syz_tun\x00'}) sendmsg$nl_route(r0, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) [ 645.884748] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 645.892560] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 645.898770] *** Control State *** [ 645.902463] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 645.909493] EntryControls=0000d3ff ExitControls=002fefff [ 645.915104] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 645.922600] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 645.929586] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 645.951238] reason=80000021 qualification=0000000000000000 [ 645.958676] IDTVectoring: info=00000000 errcode=00000000 [ 645.964582] TSC Offset = 0xfffffea3c47e096b [ 645.969070] EPT pointer = 0x00000000753ce01e [ 646.014830] *** Guest State *** [ 646.020016] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 646.029520] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 646.043217] CR3 = 0x0000000000000000 [ 646.047914] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 646.054920] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 646.080799] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 646.087726] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.096103] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.104353] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.112611] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.120601] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.128744] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.136878] GDTR: limit=0x00000000, base=0x0000000000000000 [ 646.145118] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.153287] IDTR: limit=0x00000000, base=0x0000000000000000 [ 646.161554] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.169549] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 646.176933] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 646.184473] Interruptibility = 00000000 ActivityState = 00000000 [ 646.190876] *** Host State *** [ 646.194171] RIP = 0xffffffff812048fe RSP = 0xffff8881826e7390 [ 646.200173] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 646.206656] FSBase=00007fc8dac0e700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 646.214523] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 646.220409] CR0=0000000080050033 CR3=00000001bec2c000 CR4=00000000001426e0 [ 646.227526] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 646.234264] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 646.240320] *** Control State *** [ 646.243837] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 646.250516] EntryControls=0000d3ff ExitControls=002fefff [ 646.256045] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 646.263036] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 646.269702] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 12:34:19 executing program 5: open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:19 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x270) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='bond0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000004600)=[{{&(0x7f0000002c40)=@can, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002f80)="3af628d493", 0x5}], 0x1}, 0x2da}, {{&(0x7f0000003040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @empty}, 0x2, 0x2, 0x0, 0x3}}, 0x80, &(0x7f00000040c0)=[{&(0x7f00000030c0)="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", 0x1000}], 0x1}, 0x3}, {{&(0x7f00000043c0)=@sco, 0x80, 0x0}, 0x10}], 0x3, 0x0) 12:34:19 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000002c40)={0x2, 0x0, @dev}, 0x10) [ 646.276373] reason=80000021 qualification=0000000000000000 [ 646.282822] IDTVectoring: info=00000000 errcode=00000000 [ 646.288280] TSC Offset = 0xfffffea389c8dcea [ 646.292668] EPT pointer = 0x00000001bf56f01e 12:34:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f00000001c0)=ANY=[], 0xfffffed6) r4 = socket$inet(0x2, 0x3, 0x7d) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x80) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 12:34:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x400000a77, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[@ANYRES32], 0xfffffed2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) writev(r3, &(0x7f0000000240)=[{&(0x7f00000000c0)="a6", 0x1}], 0x1) close(r1) 12:34:19 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$sndpcmc(0x0, 0x8000007, 0x400000) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:34:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000002480)="61747e720000008072656e7500") perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000002340)='/dev/loop#\x00', 0x100, 0x0) fdatasync(r0) 12:34:19 executing program 5: open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='fdinfo\x00') renameat(r0, &(0x7f0000000440)='./file0\x00', 0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00') [ 646.513828] *** Guest State *** [ 646.517682] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 646.553521] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 646.576451] CR3 = 0x0000000000000000 12:34:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015001}) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) 12:34:20 executing program 5: open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015001}) r1 = dup2(r0, r0) close(r1) [ 646.611479] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 646.630294] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 646.651213] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 12:34:20 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) [ 646.666231] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.675345] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.684180] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:20 executing program 5: mkdirat(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 646.738323] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.761296] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="636c6561725f7265667300a04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8ed0500db73e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54de66186a0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581295b31beaeaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="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") sendfile(r0, r1, 0x0, 0x1) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 646.783580] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.795088] GDTR: limit=0x00000000, base=0x0000000000000000 [ 646.805148] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.814714] IDTR: limit=0x00000000, base=0x0000000000000000 [ 646.823842] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 646.833341] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 646.867289] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 646.896451] Interruptibility = 00000000 ActivityState = 00000000 [ 646.905740] *** Host State *** [ 646.911466] RIP = 0xffffffff812048fe RSP = 0xffff88817e03f390 [ 646.919320] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 646.926305] FSBase=00007fc8dac2f700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 646.934883] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 646.941056] CR0=0000000080050033 CR3=00000001d286d000 CR4=00000000001426e0 [ 646.948301] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 646.955079] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 646.961414] *** Control State *** [ 646.961426] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 646.961434] EntryControls=0000d3ff ExitControls=002fefff [ 646.961449] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 646.961459] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 646.961469] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 646.961477] reason=80000021 qualification=0000000000000000 [ 646.961485] IDTVectoring: info=00000000 errcode=00000000 [ 646.961492] TSC Offset = 0xfffffea3468f2698 [ 646.961502] EPT pointer = 0x00000001bdf7601e 12:34:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={"6772653000000000000000007f00", 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 12:34:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0x0, {{0x2, 0x0, @broadcast}}}, 0x90) 12:34:20 executing program 3: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) 12:34:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond0\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000c0000000000000008000100736671004800020000000000000000000000002498c702fdc7641e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 12:34:20 executing program 5: mkdirat(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:20 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffffffffffdc5) r0 = syz_open_dev$vcsn(0xffffffffffffffff, 0x7ff, 0x20000) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000000)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0xffffffff00000000, 0x4) syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000080)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000000c0)=0x7) ioctl$KVM_RUN(r3, 0xae80, 0x0) 12:34:20 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x81) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000400)='gretap0\x00', 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x90005, 0x0) 12:34:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f00000001c0)={"626f6e643000000054000000000100", @ifru_names='bond_slave_1\x00'}) 12:34:20 executing program 5: mkdirat(0xffffffffffffffff, 0x0, 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:21 executing program 1: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) r0 = socket$inet6(0x18, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@un=@abs={0x25af90167d5e1800}, 0x1c) setsockopt$sock_int(r0, 0xffff, 0x40004000001001, &(0x7f0000000180), 0x4) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040)=0x5, 0x4) sendto(r0, &(0x7f0000000340)="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", 0x10e, 0x3, 0x0, 0x0) [ 647.487031] *** Guest State *** [ 647.490571] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 647.533198] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 647.562466] CR3 = 0x0000000000000000 [ 647.566974] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 12:34:21 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(0x0, 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 647.580147] bond0: Error: Device is in use and cannot be enslaved [ 647.588408] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 647.611411] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 647.624350] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fdinfo\x00') getdents(r0, &(0x7f0000002740)=""/4096, 0x1386) 12:34:21 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000140)=0xdfb, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 12:34:21 executing program 1: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) r0 = socket$inet6(0x18, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@un=@abs={0x25af90167d5e1800}, 0x1c) setsockopt$sock_int(r0, 0xffff, 0x40004000001001, &(0x7f0000000180), 0x4) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040)=0x5, 0x4) sendto(r0, &(0x7f0000000340)="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", 0x10e, 0x3, 0x0, 0x0) [ 647.657331] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 647.734402] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 647.764634] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:21 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(0x0, 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x84) [ 647.799236] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 12:34:21 executing program 1: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) r0 = socket$inet6(0x18, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@un=@abs={0x25af90167d5e1800}, 0x1c) setsockopt$sock_int(r0, 0xffff, 0x40004000001001, &(0x7f0000000180), 0x4) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040)=0x5, 0x4) sendto(r0, &(0x7f0000000340)="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", 0x10e, 0x3, 0x0, 0x0) [ 647.852485] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 647.872588] GDTR: limit=0x00000000, base=0x0000000000000000 [ 647.909481] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 647.963229] IDTR: limit=0x00000000, base=0x0000000000000000 [ 647.987804] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 648.009032] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 648.022549] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 648.038433] Interruptibility = 00000000 ActivityState = 00000000 [ 648.044793] *** Host State *** [ 648.048437] RIP = 0xffffffff812048fe RSP = 0xffff888180587390 [ 648.054446] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 648.061372] FSBase=00007fc8dac2f700 GSBase=ffff8881dac00000 TRBase=fffffe0000033000 [ 648.069489] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 648.075411] CR0=0000000080050033 CR3=00000001cce17000 CR4=00000000001426f0 [ 648.082495] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 648.089256] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 648.095319] *** Control State *** [ 648.098894] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 648.105562] EntryControls=0000d3ff ExitControls=002fefff [ 648.111094] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 648.118096] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 648.124783] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 648.131452] reason=80000021 qualification=0000000000000000 [ 648.137842] IDTVectoring: info=00000000 errcode=00000000 [ 648.143297] TSC Offset = 0xfffffea2c435586a [ 648.147617] EPT pointer = 0x00000001bbb1601e [ 648.170708] *** Guest State *** [ 648.174010] CR0: actual=0x000000008005003f, shadow=0x000000008005001f, gh_mask=fffffffffffffff7 [ 648.182949] CR4: actual=0x0000000000002068, shadow=0x0000000000000028, gh_mask=ffffffffffffe871 [ 648.191838] CR3 = 0x0000000000000000 [ 648.195544] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 648.201566] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 648.207551] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 648.214434] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 648.222529] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 648.222550] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 648.222567] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 648.239018] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 648.255103] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 648.263428] GDTR: limit=0x00000000, base=0x0000000000000000 [ 648.271689] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 648.279941] IDTR: limit=0x00000000, base=0x0000000000000000 [ 648.287964] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 648.296393] EFER = 0x0000000000006500 PAT = 0x0007040600070406 [ 648.303990] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 648.311809] Interruptibility = 00000000 ActivityState = 00000000 [ 648.318175] *** Host State *** [ 648.321549] RIP = 0xffffffff812048fe RSP = 0xffff888074bf7390 [ 648.327599] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 648.334125] FSBase=00007fc8dac0e700 GSBase=ffff8881dad00000 TRBase=fffffe0000033000 [ 648.342000] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 648.347902] CR0=0000000080050033 CR3=00000001cce17000 CR4=00000000001426e0 [ 648.355016] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 648.361729] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 648.367791] *** Control State *** [ 648.371405] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000c2 [ 648.378118] EntryControls=0000d3ff ExitControls=002fefff [ 648.383645] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 648.390621] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 648.397297] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 648.403919] reason=80000021 qualification=0000000000000000 [ 648.410332] IDTVectoring: info=00000000 errcode=00000000 [ 648.415775] TSC Offset = 0xfffffea2612fb4f9 [ 648.420142] EPT pointer = 0x00000001bab1101e 12:34:21 executing program 3: kexec_load(0x0, 0x0, 0x0, 0x160000) 12:34:21 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, 0x0) 12:34:21 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(0x0, 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:21 executing program 1: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) r0 = socket$inet6(0x18, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@un=@abs={0x25af90167d5e1800}, 0x1c) setsockopt$sock_int(r0, 0xffff, 0x40004000001001, &(0x7f0000000180), 0x4) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040)=0x5, 0x4) sendto(r0, &(0x7f0000000340)="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", 0x10e, 0x3, 0x0, 0x0) 12:34:21 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x9208, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000500)={0x0, 0x0, 0x2080}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = syz_open_dev$sndpcmc(0x0, 0xd85, 0x0) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8003, &(0x7f0000000000)=0x3c, 0x1c, 0x4) pipe2(&(0x7f00000000c0), 0x80000) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x200100000000003) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_SET_SREGS(r5, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x28, 0x0, 0x6500}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 12:34:21 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000000c0)='[', 0x1) tee(r2, r1, 0xfffffffffffffffd, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x47141272) 12:34:22 executing program 3: r0 = socket$inet6(0xa, 0x100000002, 0x0) socket$packet(0x11, 0x2, 0x300) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x400806e, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 12:34:22 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:22 executing program 1: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) r0 = socket$inet6(0x18, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@un=@abs={0x25af90167d5e1800}, 0x1c) setsockopt$sock_int(r0, 0xffff, 0x40004000001001, &(0x7f0000000180), 0x4) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040)=0x5, 0x4) 12:34:22 executing program 3: r0 = socket$inet6(0xa, 0x100000002, 0x0) socket$packet(0x11, 0x2, 0x300) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x400806e, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 12:34:22 executing program 1: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) r0 = socket$inet6(0x18, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@un=@abs={0x25af90167d5e1800}, 0x1c) setsockopt$sock_int(r0, 0xffff, 0x40004000001001, &(0x7f0000000180), 0x4) 12:34:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000280)="2700000014000707030e0000120f0a001102013e7e78486370bc2490d458467de58c5785814886", 0x27) 12:34:22 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:22 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000001c0)='./file0\x00', 0x12c2, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x202103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x2502001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 12:34:22 executing program 2: r0 = socket(0x1000100000010, 0x2, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000380)="1f0000001e0007f1fff57f02000200000005010053d6445f89390836be381b", 0x1f) 12:34:22 executing program 1: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) r0 = socket$inet6(0x18, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@un=@abs={0x25af90167d5e1800}, 0x1c) 12:34:22 executing program 0: sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x0, 0x0, 0x0, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'ib:syz1\x00'}}}, 0x28}}, 0x0) r0 = socket$tipc(0xa, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000040)=@id={0xa, 0x3, 0x0, {0x0, 0x80fe}}, 0x65) syz_emit_ethernet(0x0, 0x0, 0x0) 12:34:22 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:22 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e00c462913878fe3e0f1110c442019dccd3196f") execve(&(0x7f0000000740)="e91f7189591e9233614b00", 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000140)="e91f7189591e9233614b00", 0x40) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x200001e4) creat(&(0x7f0000000180)="e91f7189591e9233614b00", 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 12:34:22 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:22 executing program 1: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) socket$inet6(0x18, 0x1, 0x0) [ 649.490550] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 649.506667] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. 12:34:23 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:23 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:23 executing program 1: utimes(0x0, &(0x7f0000000080)={{}, {0x100000000000000}}) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) 12:34:23 executing program 1: msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="07ff2016"], 0x1, 0x0, 0x0) 12:34:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="636c6561725f7265667300a04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8ed0500db73e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54de66186a0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581295b31beaeaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000240)='statm\x00') sendfile(r0, r1, 0x0, 0x1) 12:34:23 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:23 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:23 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000240)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) 12:34:23 executing program 1: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) 12:34:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="636c6561725f7265667300a04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8ed0500db73e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54de66186a0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581295b31beaeaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") sendfile(r0, r1, 0x0, 0x1) chmod(0x0, 0x0) 12:34:25 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:25 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 12:34:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0xc) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000240)=0x434, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r1, &(0x7f0000000280)="654b01294c86ec3cb1343947baf5d23376725b83", 0x14, 0x0, 0x0, 0x0) 12:34:25 executing program 0: io_setup(0x0, 0x0) listxattr(&(0x7f0000000000)='.\x00', 0x0, 0x0) 12:34:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) syz_open_pts(0xffffffffffffff9c, 0x0) 12:34:25 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080), 0x14) 12:34:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"0000000000000000000000000200", 0x20000015001}) ioctl$TIOCGSID(r0, 0x5429, 0x0) 12:34:25 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:25 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 12:34:25 executing program 3: 12:34:25 executing program 0: 12:34:25 executing program 1: 12:34:25 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 12:34:25 executing program 3: 12:34:25 executing program 4: 12:34:25 executing program 0: 12:34:25 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:25 executing program 1: 12:34:25 executing program 4: 12:34:26 executing program 3: 12:34:26 executing program 0: 12:34:26 executing program 4: 12:34:26 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:26 executing program 1: 12:34:26 executing program 3: 12:34:26 executing program 0: 12:34:26 executing program 4: 12:34:26 executing program 1: 12:34:26 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) tkill(r0, 0x1000000000016) 12:34:26 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:26 executing program 0: 12:34:26 executing program 3: 12:34:26 executing program 1: 12:34:26 executing program 4: 12:34:26 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:26 executing program 4: 12:34:26 executing program 3: 12:34:26 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) tkill(r0, 0x1000000000016) 12:34:27 executing program 0: 12:34:27 executing program 1: 12:34:27 executing program 4: 12:34:27 executing program 3: 12:34:27 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:27 executing program 0: 12:34:27 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) tkill(r0, 0x1000000000016) 12:34:27 executing program 1: 12:34:27 executing program 4: 12:34:27 executing program 3: 12:34:27 executing program 1: 12:34:27 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:27 executing program 0: 12:34:27 executing program 3: 12:34:27 executing program 4: 12:34:27 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:27 executing program 1: 12:34:27 executing program 0: 12:34:27 executing program 3: 12:34:27 executing program 4: 12:34:27 executing program 1: 12:34:27 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:27 executing program 0: 12:34:27 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:27 executing program 3: 12:34:27 executing program 4: 12:34:27 executing program 1: 12:34:27 executing program 0: 12:34:27 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:27 executing program 3: 12:34:27 executing program 4: 12:34:27 executing program 1: 12:34:27 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:27 executing program 0: 12:34:27 executing program 3: 12:34:27 executing program 1: 12:34:28 executing program 4: 12:34:28 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:28 executing program 0: 12:34:28 executing program 1: 12:34:28 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:28 executing program 4: 12:34:28 executing program 3: 12:34:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") r1 = syz_open_procfs(0x0, &(0x7f0000000000)="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") sendfile(r0, r1, 0x0, 0x1) fdatasync(0xffffffffffffffff) 12:34:28 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sysfs$3(0x3) 12:34:28 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) dup2(r3, r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) eventfd(0x0) 12:34:28 executing program 1: socketpair$unix(0x1, 0x200000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 12:34:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') sendfile(r1, r2, 0x0, 0x4) 12:34:28 executing program 0: r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="040000000000000010000000000000003c00000000000000"], 0x1, 0x0) 12:34:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lremovexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='system.posix_acl_access\x00') 12:34:28 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:29 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) write$binfmt_elf32(r0, 0x0, 0x0) 12:34:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) write(r1, &(0x7f0000000080), 0x770b70f8) 12:34:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) dup2(r3, r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) eventfd(0x0) 12:34:29 executing program 1: setgid(0x0) setgid(0x0) 12:34:29 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000), 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:29 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getcwd(&(0x7f0000000180)=""/117, 0x75) 12:34:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) dup2(r3, r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) eventfd(0x0) 12:34:29 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") r2 = syz_open_procfs(0x0, &(0x7f00000004c0)="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") sendfile(r1, r2, 0x0, 0x1) fchmod(r0, 0x0) 12:34:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) dup2(r3, r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) eventfd(0x0) 12:34:29 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:32 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) fcntl$setstatus(r2, 0x4, 0x40400) write$FUSE_WRITE(r2, &(0x7f0000000080)={0x18}, 0x18) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) write$selinux_attr(r2, &(0x7f0000000000)='system_u:object_r:syslogd_initrc_exec_t:s0\x00', 0x2b) 12:34:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) dup2(r3, r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 12:34:32 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrandom(0x0, 0x0, 0x0) 12:34:32 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:32 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) select(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000340)={0x1, 0x2d8c, 0x81, 0x101, 0x80000001, 0x40, 0x4, 0xd372}, &(0x7f0000000380)={0x77359400}) 12:34:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) munlock(&(0x7f000010d000/0x4000)=nil, 0x4000) 12:34:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) r3 = epoll_create1(0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) dup2(r3, r2) 12:34:32 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:32 executing program 3: socketpair$unix(0x1, 0x200000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) utime(0x0, 0x0) 12:34:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) epoll_create1(0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) 12:34:32 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:35 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="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") sendfile(r0, r1, 0x0, 0x1) getsockname(0xffffffffffffffff, 0x0, 0x0) 12:34:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 12:34:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) 12:34:35 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:35 executing program 0: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0x0) r1 = memfd_create(&(0x7f0000000300)="74086e750000000000000000008c00", 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 12:34:35 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) get_robust_list(0x0, 0x0, &(0x7f0000000140)) 12:34:35 executing program 1: sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) move_pages(0x0, 0x18f, &(0x7f00000000c0)=[&(0x7f000066c000/0x2000)=nil], &(0x7f0000003b80), &(0x7f0000000080), 0x0) 12:34:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:35 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="6e756d615f6d61707300b5c62e9e8de9f243640adf803c64577aa9e4e33f9f72e5185191246f8fe224c3925050e2a9e57dbf6b530a5ebbec861baf4dc4f84bb1df13f0b152aa3b6e780781b6a8d091f88658ef4f16a21417d83d000000000000000000000000000000") pread64(r0, &(0x7f0000df6000), 0xff65, 0x0) 12:34:35 executing program 1: 12:34:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:38 executing program 3: 12:34:38 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:38 executing program 1: 12:34:38 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:38 executing program 0: 12:34:38 executing program 0: 12:34:38 executing program 1: 12:34:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x802) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='uid_map\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 12:34:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:38 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) munmap(&(0x7f0000003000/0x3000)=nil, 0x3000) fgetxattr(r0, &(0x7f0000000040)=@known='system.sockprotoname\x00', &(0x7f0000001040)=""/4096, 0x1184) 12:34:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) fcntl$setstatus(r1, 0x4, 0x40400) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18}, 0x18) madvise(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x9) 12:34:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="6c6f67696e7569640039dad3c444de4a35f0fd223db6aa1e2fdd63c9f35f389e4669e0af6522c225bbb645ae9e0f46c87cd44db4919c1a34ab1d00bb4157f79b23912e9b96566ebf938974f48d420c49e5b30900000000000000192f040000009a2b9c35bf253332e8833efab84cdec63c1f73e1df14a25ed1d06e145bf63020475da8d955c099248a270c78a2b1c92fb4fd7034c322ea95ce1052a870c6dfc87c7814b8a2bbca47eb4c90f550c57fe2971c7284c7ba86966b3176177a7b912be572300e7a341245b25bb59400058b83526cd1ec89295864696722322a5ecd3ddfda832534e55f7120412149fe7f9c13ff3047c99241cf03aac047ae726411e6000000007c3bb14032db738b34506b4731a16090d90732654cef8e47588cbb41a64a153d175de45868cf57fb742521176076ebae2c9af7c041f9225c4f11e417a6b83ddb1cf0458a562509c178db101ee62092594dbe2a3068faf30dcad23baa69d04906642fba1fbe7a1fafb7bcfa61f17a2b72a4083f2743de7a6a9d670a49b749e4cd6acc1f43cf41c0ff24627e142994533acbccf3f062cce3aa7d9fbadbe6ac239ae9cf400252640a3670d0324ebc1af84824f6621027c289ac39c9587c7b") sendfile(r0, r1, 0x0, 0x1) membarrier(0x0, 0x0) 12:34:38 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) 12:34:41 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fanotify_init(0x0, 0x0) 12:34:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000040)) timer_gettime(0x0, 0x0) 12:34:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="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") sendfile(r0, r1, 0x0, 0x1) lseek(0xffffffffffffffff, 0x0, 0x0) 12:34:41 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:41 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:41 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:41 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) open(0x0, 0x0, 0x0) madvise(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x9) 12:34:41 executing program 0: clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) symlink(0x0, &(0x7f0000000080)='./file0\x00') sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x20, r0, 0x0, 0x0) 12:34:41 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0), 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") r1 = syz_open_procfs(0x0, &(0x7f0000000200)='cgroup\x00') sendfile(r0, r1, 0x0, 0x1) 12:34:41 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:44 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:44 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:44 executing program 3: unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) 12:34:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="6c6f67696e7569640039dad3c444de4a35f0fd223db6aa1e2fdd63c9f35f389e4669e0af6522c225bbb645ae9e0f46c87cd44db4919c1a34ab1d00bb4157f79b23912e9b96566ebf938974f48d420c49e5b30900000000000000192f040000009a2b9c35bf253332e8833efab84cdec63c1f73e1df14a25ed1d06e145bf63020475da8d955c099248a270c78a2b1c92fb4fd7034c322ea95ce1052a870c6dfc87c7814b8a2bbca47eb4c90f550c57fe2971c7284c7ba86966b3176177a7b912be572300e7a341245b25bb59400058b83526cd1ec89295864696722322a5ecd3ddfda832534e55f7120412149fe7f9c13ff3047c99241cf03aac047ae726411e6000000007c3bb14032db738b34506b4731a16090d90732654cef8e47588cbb41a64a153d175de45868cf57fb742521176076ebae2c9af7c041f9225c4f11e417a6b83ddb1cf0458a562509c178db101ee62092594dbe2a3068faf30dcad23baa69d04906642fba1fbe7a1fafb7bcfa61f17a2b72a4083f2743de7a6a9d670a49b749e4cd6acc1f43cf41c0ff24627e142994533acbccf3f062cce3aa7d9fbadbe6ac239ae9cf400252640a3670d0324ebc1af84824f6621027c289ac39c9587c7b") sendfile(r0, r1, 0x0, 0x1) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 12:34:44 executing program 0: clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) symlink(0x0, &(0x7f0000000080)='./file0\x00') sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x20, r0, 0x0, 0x0) 12:34:44 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:44 executing program 1: 12:34:44 executing program 0: clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) symlink(0x0, &(0x7f0000000080)='./file0\x00') sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x20, r0, 0x0, 0x0) 12:34:44 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 671.337048] IPVS: ftp: loaded support on port[0] = 21 12:34:44 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:44 executing program 0: clone(0x3502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) symlink(0x0, &(0x7f0000000080)='./file0\x00') sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x20, r0, 0x0, 0x0) 12:34:44 executing program 1: 12:34:47 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) tkill(0x0, 0x1000000000016) 12:34:47 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:47 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:47 executing program 1: 12:34:47 executing program 0: 12:34:47 executing program 3: 12:34:47 executing program 3: 12:34:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b70200001a4b0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001030000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="7a64f6bfff9c6ca28be45c3904ff", 0x0, 0x101}, 0x28) 12:34:47 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:47 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000180), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000000)=@in={0x2, 0x2000000, @dev={0xac, 0x14, 0x14, 0x18}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)="e5", 0x1}], 0x1}, 0x0) 12:34:47 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 12:34:48 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net////\x00', 0x0, 0x0) 12:34:48 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:48 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:48 executing program 2: futex(0x0, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:48 executing program 0: socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b70200001a4b0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001030000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="7a64f6bfff9c6ca28be45c3904ff", 0x0, 0x101}, 0x28) 12:34:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x3, 0x0, 0x0) close(r0) 12:34:48 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:48 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:48 executing program 0: gettid() ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000a80)=0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x20) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x0, 0x70, 0x6, 0x8000, 0x4b7, 0x8000000100000000, 0x0, 0x100000000, 0x208, 0x4, 0x0, 0xffffffffffff8000, 0x4, 0x7f, 0x0, 0x100000000, 0x0, 0x0, 0xe02, 0x940, 0x8, 0x7, 0x7ff, 0x5879, 0x8001, 0x0, 0x5, 0x3, 0x40, 0x6, 0x4cf7, 0x6, 0xbd4e, 0x9, 0x10001, 0x3ff, 0xbea8, 0x0, 0x0, 0x7ff, 0x4, @perf_bp={0x0}, 0x8, 0x0, 0x3, 0x9, 0xffffffffffffff5a, 0x0, 0x8001}, 0x0, 0x7, r0, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b70200001a4b0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001030000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000000c0)="7a64f6bfff9c6ca28be45c3904ff", 0x0, 0x101}, 0x28) 12:34:48 executing program 2: futex(&(0x7f000000cffc), 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:48 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x3, 0x0, 0x0) close(r0) 12:34:49 executing program 0: socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003a80)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x3, 0x10) setsockopt$sock_attach_bpf(r1, 0x10e, 0x2, &(0x7f00000000c0)=r0, 0xaaa8ad1779faffc1) 12:34:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) 12:34:49 executing program 2: futex(&(0x7f000000cffc), 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000180), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000ac0)={'vcan0\x00'}) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40010000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280), 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x5}, 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x80, 0x0}, 0x0) 12:34:49 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000008c0)="d8", 0x0}, 0x18) 12:34:49 executing program 2: futex(&(0x7f000000cffc), 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) 12:34:49 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:49 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f00000003c0)={0x6, 0x70, 0x7c3c, 0x8, 0x3, 0x0, 0x0, 0x1, 0x1400, 0xd, 0x1, 0xffffffffffffff87, 0x10000, 0x3, 0x16fd, 0xd6df, 0x4, 0x0, 0x8001, 0x7fff, 0x0, 0x10000, 0x0, 0x6, 0x9, 0x7, 0x81, 0x0, 0x0, 0x4, 0x20, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x401, 0xffffffffffffffff, 0x8000, 0x0, 0x100000001, 0x7, @perf_config_ext={0x1, 0x1}, 0x20, 0x7f, 0x8, 0x3, 0x0, 0x9}, r0, 0x2, r2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xf, 0xffffffffffffffff, 0x80) unlink(&(0x7f0000000040)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) close(r2) close(r2) 12:34:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000180), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000ac0)={'vcan0\x00'}) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40010000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280), 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x5}, 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x80, 0x0}, 0x0) 12:34:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000180), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000ac0)={'vcan0\x00'}) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40010000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280), 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x5}, 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x80, 0x0}, 0x0) 12:34:49 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:49 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) 12:34:49 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0, 0x0, &(0x7f00000009c0)=[{0x1010, 0x10b, 0xfffffffffffffffd, "e30b081529b689b999b8d1b3b43482e2d070105508f8a7796e91a149a5eef2f1ffed6fb65535c94d8120c05c5b74a07d062ae8417df668a47c03878906a2d939b103c9b727a696d2eda4d2928dcca70b8e789e1983cf936b193898ee4b845874e9d13ee6d684f5f829dd2056228c0d47ccfac1304a177345c97123d920ca35e73d5ea39aef2763cfa96500cec4575f974769dda84983c218dc2a06adf56d069aafd9f110d5bfc24c7d21c6699076f8f9671525bdbae20b38c39608188d0e2b82955d87640f601dca02f176ed2008a760b50c4f57be0450ed2e9b82330f9f40ea0f093647a81d93c12db170ef71112294d752e4295455ee2231b917d8a90efdf7dd5fc03011151779fcbbf3dfafe88f7492196884f7640706b3368016dc191646274757d6256770c77c42d7da633dbacdc21c502f588f641a4cc5e4dcfa15cf0b0b3b0cc9d3afe0b3ad1cfd9ee188d674a3a3709564ac48624c72cda5c2e90b16fc65c1c65c86e75c96385d41534fe74d357944dd23a494bad4e24ba574894f275d6714d691ff65cb30b577ff4ad96d1cde82215832dd2eaa0bd8c998f726c3678ae5b132cd7852f132644f21ee34ef003186cb2faa54c06c0a941a52096bd0ef886d6e95afc2358fb9acbbaaa649db42500d4b6038ebe49a66812a98d6f5bd63cdcdf2dcb2240b0ff8f1a7fa658d2aee17e82eed7b5352d6ab826e31c289264ebd024bb967e97dca81dd7ca10726c8f9406ecc0d1878dcff55034f7b5d4ef88ddaa3cf55cb27cc6effaf6d05984b4cb9697bc4cdee597351dc09e21d402b59e6a6148d39d0f87d95f6a03129a3ae4edcc0088ac49886f4661433d72695e8c6ba80abb9994cee65e21a1d2682da44cbdb860cbac9be040056ed3781032f4540e73ba5309913edf216db953ea7191506565146a891ccfaa3e1ceb73e7ea123121e20a83949fec9b01b4edd6b56659f3251e029fe350260e36b2aca529ba647a8d9d1706da2b39f4dea4a2bea3cde16b29cea499db9ac2308fe01dd86db74dc3018a1f4a73b889bba8dff6750efef358c04ccaa753b5f753de83afe9e9c676c28dac708f903ac3e9fcff872ecffa8bb828e63e2c0059c7221406189f509af33a95e56c8d2db6d3542def0ccf06f8404afad9929fb8d5a1b15fb0982e27ca4d8355bc2a0c26dea811ba0024cf9532f63c030388a3ee18fbe1aaf4f0e79db37a1a62c3b81389bdab000f1210813860f245d59d3e830b1fd53f419189b34039bf08af323dee2e0302fcc7c99c412e540e91303038bd4892877073fdbbf7238bde82112915e107c41adad51fecc5520067898b6c2903d9ef6472bfc8e1c832d3f70b52eb7a1ef5bbbeabc7aa4880ba6ea8e95de53164d9046485a21cc96d05fc52e3e1004ff1f2fb911ef38b379ddd0b4e2f80f9ac24cd918b645c566c8ff4816b29c17e97ddd43b4b2666f4c89208dd1576d59619338a3586dabaa6412c4f56a78aa0afbd27870c8d102dbed1c339c538b75f96ba2280ac652d0a9601a64c66441677c7a8b06adb2652b0decb17c480acfc64c44f18d3ec03d57c623717ebcdc56b17d338443a5ca0c899c8dcbb08101ff9ae69a078e5113b6af55f4718370d507b137fca33efbd9cac1f4c885a1cc4ee7aaf46fe8abd03aa481a8867be2521099cfba1890c4a481a60cfedf0ce815e70bc4e21b1b22a8023514c285d5f3ea08cc3318617c29898c5b294619b59e5e710b4c3c3a726bae5fbc40aab2268b3beb2b75d08383b0607d395e35b70b3dea74cc848f56ad91eb295df3bef0f1f77ef4c70019b7d40c4ba2c9d294a2d11f64e748047c40e7b3e0a3981e913a9f25c6d47a303ec9ce35eb43a657f5d54f4ea30c1d159553988b2493d0cf03b873f8a87884a317ed13deb1a581dfcf10b00a53fcf1453327f0c76622ef4e650c8b4ee4b432a98e553ef43a7c5f0d50380f7026775fe41460f38ae017eb4dea2583d560b4aa5df1af6ce3fc875695a021e5e0077584b44b61f7309817eec5ca76ab0245a483436c9431569652554483f580cf12b6d1ca0844567254639c555c0d59e720b68d38006354b7fd59022736ca985c020f65250600912d27dd807441e24eb8394efcff6f1a1d529cdd2b38d96fc40bcc24ff2f785c580dd8d784783af52944fbd295df16ee6629d299d7aef28a4511fdf78c7ec2a9f5720292cec561b026fe5fd59c77bb1e2f426eca6012c219464510546a588455175e7c339dc8248ba6ae14d14a2d1a9472c844368309837c9544ad8a71943ed939edf667eb46459810f8200698082eb105337b18895f9aef2c191f3b218c0a228de24da727097162fd04db9f226adfe7d86352b11ac73a06591f28eb2aa4c994d776aa4f57fff5bb85ac4549dc012fd767a5e2fe42fcb27cf2f30c146bd0885e226f16d4aa1c67f5743cac68674efd8c88fb3c60ec38e327bddae91f5174d207f2a5cab409571ba74e083209c19d22a93e8d06f19e753dc7831b0720f9f16e58c6ee8d405ed4bf5552171c66f4b9480921fd8e7ee4835746dd3e2b079778fa31110f2b08ad9934c77d301aca2aa4e03fd37ffe5ebb14df164e84706b21d9b12d8adea22b0a0ac4e9a481313cca3adc070578dcb592d37f2fc99023e056da83c7255ef1a12a41f974741438758b8a4b12e6848fc03a80e916b775e0690a15491665e5d614361a993914f3ed996c6056d8577925f4ff1ddfc0b1a010f9b5b7bd7872fdf723811d7faeff0198ac8f4191dc72891c2b2e2710a6c5d9a8368e10291f9fcec8d24ca8083dcad6a83fbefa26c6535cec76e1fa5477669bb40b4d7caff117681328add65e66fd1e8e947d42233eebef2c2049a9790088557db6be0dfe1adad7a4f5b669ece8c9c9bf8b646686a0ae5d40e385e2c93f2464cded30fcfe9e7c75602bd44190b12efdf4b83f97db4ee80e682d2fe364cc247f4080f030a5726cfa5c7fd3fcf72dcf88d26c6a91f3cf8026bbcd64e47a89f471a6306b43963514de50612dccc8a874c462b9c06cc8e9f0f7f7c9501ccb3f86710bc5f34e344184e9175e859b300f15164a7de0c6347959d4af3726f933df7f244857f2f0b66d37d3acc3bc23a9856fc5725b26cf4c3040b7337a2d049a15f2ac8c0940cd1bcbc969f0087274bf209fe6df413fbdc22e531be65131e7983556e912caccc91cb4a8a0041480535c527b423ad6752c6387556a1a2defe7ddb7852509b93847d7fbb5953f84203f65ffaccd9f5ab7ede466c0bcd6e7f268e5dedbd6dd2b5becc4a810c531eaffedd83d7bd0cd353c2e89869ab8d54c64b7684d8b171d452c119fcef4b3c271854b8ab2d55688011d13dae4ff73ebfaf510c47a49d6a9cc5dd8eab9bd0e671aa1233acca011d79beab44db732a35d34e48512a6e79fcbfa31ba9dd9f81c00a56284e44870a13c366ad38d07c08347d27365b17f9485816c5692f3be57fbffba42ebe2d861b0601292cff8bbe613893e973b53731692a6c835aa96718f32585ebc27790e2a2b2117948ce0025059292b885c8b77957f4fea5688d427142a2f1d6cca21ad2944837f2a22a1732dce9403325f130df28c3bef8e33a5d6844d8e9b4b6f96dcb91ed299faca234984d1c16dab30e52ad955042d6be10d8335888f228ffaa6b0b583169c2582b21705fd3b13e554653ed82fdc1ab2eb20a0efade18323c21e656c1aac9b88504f8bbe21d40c1bff4b1208530d470e1c2eb4bca469a264e1f88d4308610d32e3799917fef1edfd6b625e316efe0798e853c92c92cf3175743641a4dc580a920d0986e8614a2f88c65008c8b0212d661045fa021c021bcf6a93800866f2ecfd496174e513c9639fbc74d74908e1cc5529040d993674b70a5fe4c737794b6634fe93866986fca87a8766008036f01465c8ce64eb67b8afc6b96ca08ee0fc2fb18a022dfbc46155179faaa0d2719c7570e190d947d9925127dbe582d364e762bedb64e68db8c8bba0e6858888462713671695edb375d934e26b508510b99643eb2e0f609f1cdac00a2830fc99c84de26542365bb80911bb6642a6e080130652471672750b09dbd16b007aa38b76d3e4e2604b0421fda5f44b80fef8e0a7adc534f383ee71928b5b0b4ac0d3642134bdfaf68c895e48e9f0dbd5a9de2ffea43a36216fed8202df33e9dec1c259c122851c32dbfd39aad3d07a1379255f51b13f4041f4456eee17f82b93e4dc57b13350c5e7031e824c2d6b86da8814e821a3cb81a2e136b1f66a593c1d05cc6703737c21d2d78ca3692b5e2d5ed0d7a2bd6c5be8f2cf8ee833392b1478380026104c52c1a4495929fa7fa340fa780c5033842f44689c76edd118298d7b4efb147a2d1d0c554cf319e61684e319f4afb3aa5ebba04718e647dda062916de3e6045fa3edccc056248ace39468b2bd559411d48780507b663294d0d431b7a4f996dbc039585ecedf7c299a5264101dc33c25d0fceae06aacfd6e36b512531abd74de4d519a64177b87700b51b56b1fa75577abd5a3fac0e91869a5bce444013810e0b19562656c25e9b638502f507442edc055dabd56cbd9a1e0eb7eecfc62681786c98c05c6ef5b0e9d7907cd9242128e5b8bf65343e801a1c733a2ad6e839b983e7283bb4d46b0dc98028e0cd735eaaa8bf0e05892b59bfeded98b4257e679887c3ead36b2eedd2abeb4e0996a7f9406718fc4a9c22192e6df35e1f5fb5d1c2143200d958497536ac628823887143867460e1621b9fdcb57a158f910c491a75e6a4bfc3846eac034dff8c671bfd0e71c7018f5478cfed51e9eb2451e636cca7cbde92b85a95e0fd3dbc9e351f00fd23fd551ec170ead37ab08a54450cc689657ae97176e444f45d44b0174ebd75b6bc91e428c047b6a116d451c1bf4387ae943ea55d239c7508c69b9855c210eb219495155e606d98cbcd687635f1026fabd0a4b0ea3f0b2071df98c402026fcebe06282632cdb4e05d664275339cc699f8854a1976b95cc0c8df63056416007fc768b827225e5d24c1ee10a8b312bf8f35b86cca442a386528936ac0bd13c79ea3c6ea39032a145f735bc0c3e37a9d7b8351f29a69c1329f419b7b9b5ee4f9e8cabae3b7fd817c397f262c17bbc5418e3eaa8ae7dc0334f32c7f1fa674bcf0dc21bc3252ffa7b653fd9437872ba0e054fe3481135351f9c128174c688e654b5e421cda4f0dd720f60ccdcf55e52bb16dfb129d2b722a16bdddec60c60e375f01763d0fd8a511bdfd2a3b3ae412a8bba05cbb1c34d1f5809dda2be50e974ceb19e1f0b1861e622a52d93213a9db703c60848f5098aae34d5a908e670d9d76f2dfa36d2eb37e9846b5ef47c2031627341ba60cebfd40d80e2c98d467f8908a4ec00f4f000773b5656a524e79bfd4a9561301d574d17e48b420825d5196aaa81904bd12bdc9751a96f5ff47a121af8dd9ee1f1c3382fa5f9909105d33513fbc9ebea36809b1009d00b2ba5e0fb5c635cd32a14da20cf3b255e84748a755f88839a038e66a98ed652e8eb21a6cb85a993a5775a8801d256ad6a325a9808590c148da94654d7e5eef7312ef960aaa87ee1a1d21574eda296520962db92f57796d9df4f46f727f8d8ecaf3735701ef581a8179775ce1ce9b29806a01783bc74c2ea6ca1123bcab894ac46eefc317095f7d83b7c0acce443f78f80b5016eeb2defb71398482e46e591bcd20d54018bc52a93d7b441e579f2a63dd3a1334f8d952d39debd737f114be888eb0426d2528b7d411fd544df55d2b102b6e30ede6cf81e49478a796ead232ece180ed"}], 0x1010}, 0x240048c0) 12:34:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x40, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000008c0), 0x0}, 0x18) 12:34:49 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x44000) 12:34:49 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) 12:34:49 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8910, &(0x7f0000000000)) 12:34:49 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="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") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f00000003c0)={0x6, 0x70, 0x7c3c, 0x8, 0x3, 0x0, 0x0, 0x1, 0x1400, 0xd, 0x1, 0xffffffffffffff87, 0x10000, 0x3, 0x16fd, 0xd6df, 0x4, 0x0, 0x8001, 0x7fff, 0x0, 0x10000, 0x0, 0x6, 0x9, 0x7, 0x81, 0x0, 0x0, 0x4, 0x20, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x401, 0xffffffffffffffff, 0x8000, 0x0, 0x100000001, 0x7, @perf_config_ext={0x1, 0x1}, 0x20, 0x7f, 0x8, 0x3, 0x0, 0x9}, r0, 0x2, r2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xf, 0xffffffffffffffff, 0x80) unlink(&(0x7f0000000040)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x28, &(0x7f0000000100)}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) close(r2) close(r2) 12:34:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) 12:34:50 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000240)={'team0\x00'}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x33c) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x5a) close(r2) 12:34:50 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:50 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000240)={'team0\x00'}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x33c) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x5a) close(r2) 12:34:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000240)="12", 0x1}], 0x1}, 0x4) 12:34:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000240)={'team0\x00'}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x33c) gettid() socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x5a) close(r2) 12:34:50 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x44000) 12:34:50 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 12:34:53 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) 12:34:53 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001440)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000440)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001480)=r1, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) socketpair(0x5, 0x0, 0x1000, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000001500)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', r6}, 0xa) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000240)='#system/\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000014c0), 0x4) perf_event_open(&(0x7f0000001580)={0x7, 0x70, 0x0, 0x0, 0x71, 0xfffffffffffffe01, 0x0, 0x4, 0x1020, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0x3ff, 0x8, 0x7, 0x800, 0x9bb0615, 0xaa, 0x9, 0x4, 0x4, 0x492, 0x3, 0xff, 0x8, 0xfffffffffffffff9, 0x9, 0x5d, 0x9, 0x7, 0x4, 0x7, 0x0, 0xdca9, 0x1, 0x4, 0xd83, 0x0, 0x9, 0x7, @perf_bp={&(0x7f0000001540), 0xb}, 0x80, 0x20, 0xfffffffffffffffc, 0x2, 0x3, 0x200}, 0x0, 0xe, r4, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1d7b7ffffffffffe) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x6000000, @loopback={0xfc00000000000000, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000400)='\x00', 0x1}], 0x1}, 0x7ffd) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)=r2, 0xfffffffffffffcad) 12:34:53 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:53 executing program 3: r0 = socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000001700)={&(0x7f0000000040)=@nfc={0x27, 0x1}, 0x80, 0x0, 0x0, &(0x7f00000012c0)=[{0x10}], 0x10}, 0x40000) 12:34:53 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) 12:34:53 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:53 executing program 3: ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x0, 0x70, 0x6, 0x8000, 0x4b7, 0x8000000100000000, 0x0, 0x100000000, 0x0, 0x4, 0x0, 0xffffffffffff8000, 0x4, 0x7f, 0x7, 0x100000000, 0x4, 0x0, 0xe02, 0x940, 0x8, 0x0, 0x7ff, 0x5879, 0x8001, 0x0, 0x5, 0x0, 0x40, 0x6, 0x4cf7, 0x6, 0xbd4e, 0x9, 0x10001, 0x0, 0x0, 0x6, 0x0, 0x7ff, 0x0, @perf_bp={0x0, 0x7}, 0x8, 0x2, 0x3, 0x0, 0xffffffffffffff5a, 0x3}, 0x0, 0x0, r0, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b70200001a4b0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001030000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000000c0)="7a64f6bfff9c6ca28be45c3904ff", 0x0, 0x101}, 0x28) 12:34:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) 12:34:53 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) 12:34:53 executing program 3: ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x0, 0x70, 0x6, 0x8000, 0x4b7, 0x8000000100000000, 0x0, 0x100000000, 0x0, 0x4, 0x0, 0xffffffffffff8000, 0x4, 0x7f, 0x7, 0x100000000, 0x4, 0x0, 0xe02, 0x940, 0x8, 0x0, 0x7ff, 0x5879, 0x8001, 0x0, 0x5, 0x0, 0x40, 0x6, 0x4cf7, 0x6, 0xbd4e, 0x9, 0x10001, 0x0, 0x0, 0x6, 0x0, 0x7ff, 0x0, @perf_bp={0x0, 0x7}, 0x8, 0x2, 0x3, 0x0, 0xffffffffffffff5a, 0x3}, 0x0, 0x0, r0, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b70200001a4b0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001030000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0xe, 0x0, &(0x7f00000000c0)="7a64f6bfff9c6ca28be45c3904ff", 0x0, 0x101}, 0x28) [ 680.839895] audit: type=1804 audit(1544618094.051:97): pid=26520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="memory.events" dev="sda1" ino=16868 res=1 [ 680.860168] audit: type=1800 audit(1544618094.051:98): pid=26520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=16868 res=0 12:34:56 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:56 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000200)=@dstopts={0x87, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:56 executing program 3: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000004010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)=0xfbfffffaff0) 12:34:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) 12:34:56 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001440)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000440)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001480)=r1, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) socketpair(0x5, 0x0, 0x1000, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000001500)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', r6}, 0xa) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000240)='#system/\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000014c0), 0x4) perf_event_open(&(0x7f0000001580)={0x7, 0x70, 0x0, 0x0, 0x71, 0xfffffffffffffe01, 0x0, 0x4, 0x1020, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0x3ff, 0x8, 0x7, 0x800, 0x9bb0615, 0xaa, 0x9, 0x4, 0x4, 0x492, 0x3, 0xff, 0x8, 0xfffffffffffffff9, 0x9, 0x5d, 0x9, 0x7, 0x4, 0x7, 0x0, 0xdca9, 0x1, 0x4, 0xd83, 0x0, 0x9, 0x7, @perf_bp={&(0x7f0000001540), 0xb}, 0x80, 0x20, 0xfffffffffffffffc, 0x2, 0x3, 0x200}, 0x0, 0xe, r4, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1d7b7ffffffffffe) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x6000000, @loopback={0xfc00000000000000, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000400)='\x00', 0x1}], 0x1}, 0x7ffd) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)=r2, 0xfffffffffffffcad) 12:34:56 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001440)={0xffffffffffffff9c, 0x10, &(0x7f0000000300)={&(0x7f0000000440)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001480)=r1, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) socketpair(0x5, 0x0, 0x1000, &(0x7f0000000000)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0x20032600) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000001500)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', r6}, 0xa) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000240)='#system/\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000014c0), 0x4) perf_event_open(&(0x7f0000001580)={0x7, 0x70, 0x0, 0x0, 0x71, 0xfffffffffffffe01, 0x0, 0x4, 0x1020, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0x3ff, 0x8, 0x7, 0x800, 0x9bb0615, 0xaa, 0x9, 0x4, 0x4, 0x492, 0x3, 0xff, 0x8, 0xfffffffffffffff9, 0x9, 0x5d, 0x9, 0x7, 0x4, 0x7, 0x0, 0xdca9, 0x1, 0x4, 0xd83, 0x0, 0x9, 0x7, @perf_bp={&(0x7f0000001540), 0xb}, 0x80, 0x20, 0xfffffffffffffffc, 0x2, 0x3, 0x200}, 0x0, 0xe, r4, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x1d7b7ffffffffffe) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x6000000, @loopback={0xfc00000000000000, 0x7ffff000}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000400)='\x00', 0x1}], 0x1}, 0x7ffd) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001600)=r2, 0xfffffffffffffcad) 12:34:56 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) 12:34:56 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b70200001a4b0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001030000b7030000000000006a0a00fe00000000850000002b000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="7a64f6bfff9c6ca28be45c3904ff", 0x0, 0x101}, 0x28) 12:34:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, 0x0, 0x0, 0x0) 12:34:56 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:56 executing program 3: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000004010}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)=0x4000004010) [ 684.099770] audit: type=1804 audit(1544618097.284:99): pid=26565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="memory.events" dev="sda1" ino=17008 res=1 [ 684.120193] audit: type=1800 audit(1544618097.284:100): pid=26565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="memory.events" dev="sda1" ino=17008 res=0 [ 684.643304] audit: type=1800 audit(1544618097.819:101): pid=26553 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="memory.events" dev="sda1" ino=17011 res=0 12:34:59 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:34:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, 0x0, 0x0, 0x0) 12:34:59 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:59 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 12:34:59 executing program 0: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) 12:34:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r2, 0x0, 0x0, 0x0) 12:34:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r0, r1, 0x0) 12:34:59 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts={0x0, 0x0, [], [@ra]}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) [ 686.349435] audit: type=1326 audit(1544618099.505:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26583 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:34:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="636c6561725f7265667300a04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8ed0500db73e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54de66186a0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581295b31beaeaffb76778a196ad93aa3d2d7a067208279bf069a5b6c298fc93eab2b145364936fc3f6d625a2d8e4959f4c28b814e8e829486647535f6dd464553ba34b2f1ab8c1e4b6b2bb7007940adf80c886883d1525ceeea28e751b470a909c7e7a91afdab69f0f19e7dd8ca7fb26600be79dd2125f2d0e0425061c3dc6b344f8132cd86cad7f0d76b00000000000000000000") r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="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") sendfile(r0, r1, 0x0, 0x1) getegid() 12:34:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="6c6f67696e7569640039dad3c444de4a35f0fd223db6aa1e2fdd63c9f35f389e4669e0af6522c225bbb645ae9e0f46c87cd44db4919c1a34ab1d00bb4157f79b23912e9b96566ebf938974f48d420c49e5b30900000000000000192f040000009a2b9c35bf253332e8833efab84cdec63c1f73e1df14a25ed1d06e145bf63020475da8d955c099248a270c78a2b1c92fb4fd7034c322ea95ce1052a870c6dfc87c7814b8a2bbca47eb4c90f550c57fe2971c7284c7ba86966b3176177a7b912be572300e7a341245b25bb59400058b83526cd1ec89295864696722322a5ecd3ddfda832534e55f7120412149fe7f9c13ff3047c99241cf03aac047ae726411e6000000007c3bb14032db738b34506b4731a16090d90732654cef8e47588cbb41a64a153d175de45868cf57fb742521176076ebae2c9af7c041f9225c4f11e417a6b83ddb1cf0458a562509c178db101ee62092594dbe2a3068faf30dcad23baa69d04906642fba1fbe7a1fafb7bcfa61f17a2b72a4083f2743de7a6a9d670a49b749e4cd6acc1f43cf41c0ff24627e142994533acbccf3f062cce3aa7d9fbadbe6ac239ae9cf400252640a3670d0324ebc1af84824f6621027c289ac39c9587c7b") sendfile(r0, r1, 0x0, 0x1) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:34:59 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:34:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) write(r1, &(0x7f0000000000)='&', 0x1) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) write(r2, 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) 12:34:59 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:34:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) getpid() [ 686.661900] audit: type=1326 audit(1544618099.822:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26621 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 686.969623] audit: type=1326 audit(1544618100.120:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26583 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 687.468467] audit: type=1326 audit(1544618100.616:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26621 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:02 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:02 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setfsuid(r2) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r3}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r4, 0x7fff) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='.Rcgroqp.\x00\x00\x00\x00\x00\x00`@\x00', 0x1ff) 12:35:02 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000200)='./file1\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) write$P9_ROPEN(r2, &(0x7f0000000000)={0x18}, 0xffffff73) io_setup(0xffffffffffffffbc, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(r2, &(0x7f0000000580)='./file0\x00', 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file1\x00', 0x8, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) 12:35:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="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") r1 = syz_open_procfs(0x0, &(0x7f00000004c0)="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") sendfile(r0, r1, 0x0, 0x1) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 12:35:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = socket$alg(0x26, 0x5, 0x0) syncfs(r0) 12:35:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) [ 689.342761] audit: type=1326 audit(1544618102.480:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26635 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 12:35:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000ac1414aa0000000006000000ac1414bbac1414bbac1414bbe0000002ac1414bb7f0000012db36adbacc57e63d79eee61ed0465a6dcf99393312cee3d5e80bfdd44253090d6bd7bb4477a927bc01493e4a544013aad0762cc9acf5f3d6a21452b43fb4471df1decc882f3143f2e2bfb74d5ed5aa51ce4de43b2b275ce40315543a6d50c8357cf241248435ff30d5c"], 0x1) 12:35:02 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x100000001) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x1) 12:35:02 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:02 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_procfs(r1, 0x0) [ 690.123110] audit: type=1326 audit(1544618103.254:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26635 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:05 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:35:05 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x100000001) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x1) 12:35:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000600)="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") utimensat(r0, 0x0, 0x0, 0x0) 12:35:05 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}, r2}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r3, 0x7fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000020000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) mmap(&(0x7f0000037000/0x400000)=nil, 0x400000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, 0x0) 12:35:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 12:35:05 executing program 1: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 12:35:05 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000040)='./file0\x00', 0x103f, 0x0) clone(0x2000000000100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 12:35:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x80000) dup3(r1, r0, 0x80000) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:35:05 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000300)) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:05 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 692.720126] audit: type=1326 audit(1544618105.832:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26708 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 693.519335] audit: type=1326 audit(1544618106.616:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26708 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) 12:35:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) creat(&(0x7f0000000180)='./file0\x00', 0x0) 12:35:08 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) eventfd2(0x0, 0x0) 12:35:08 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:08 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:08 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) ftruncate(0xffffffffffffffff, 0x0) [ 695.529332] audit: type=1326 audit(1544618108.609:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26719 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) epoll_create1(0x0) [ 695.596663] audit: type=1326 audit(1544618108.639:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26718 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 695.625078] audit: type=1326 audit(1544618108.649:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26716 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:08 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 695.720341] audit: type=1326 audit(1544618108.797:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26735 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:08 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000008c0)={@ipv4={[], [], @multicast2}}, 0x80) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:08 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000080)='./bus\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:09 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:09 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:09 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000180)) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 696.336607] audit: type=1326 audit(1544618109.412:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26719 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 696.360923] audit: type=1326 audit(1544618109.442:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26718 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 696.384407] audit: type=1326 audit(1544618109.462:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26716 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) readlink(0x0, 0x0, 0x0) 12:35:09 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:09 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) setregid(0x0, 0x0) [ 696.502297] audit: type=1326 audit(1544618109.581:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26762 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:11 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 12:35:11 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:11 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) sync() 12:35:11 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) setregid(0x0, 0x0) 12:35:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) inotify_init() [ 698.657651] kauditd_printk_skb: 4 callbacks suppressed [ 698.657665] audit: type=1326 audit(1544618111.713:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26777 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 698.692684] audit: type=1326 audit(1544618111.743:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26779 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 698.725875] audit: type=1326 audit(1544618111.723:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26778 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:11 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 698.749747] audit: type=1326 audit(1544618111.753:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26780 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:11 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:12 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:12 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:12 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:12 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, 0x0, 0x0) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 699.450059] audit: type=1326 audit(1544618112.496:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26777 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 699.473449] audit: type=1326 audit(1544618112.516:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26778 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:14 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:14 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) pipe(&(0x7f0000000240)) 12:35:14 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) tgkill(0x0, 0x0, 0x0) 12:35:14 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, 0x0, 0x0) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:14 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) 12:35:14 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/net\x00') perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x5460, &(0x7f0000000100)) [ 701.744774] audit: type=1326 audit(1544618114.777:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26818 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:14 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x4000, 0x0) pread64(r1, &(0x7f0000005000)=""/4096, 0x1000, 0x0) [ 701.808967] audit: type=1326 audit(1544618114.807:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26824 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 701.831608] audit: type=1326 audit(1544618114.817:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26821 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:14 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, 0x0, 0x0) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) [ 701.958453] audit: type=1326 audit(1544618114.986:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26842 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:15 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100), 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:15 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100), 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:15 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100), 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:17 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:17 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) eventfd(0x0) 12:35:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2) 12:35:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) timer_create(0x0, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 12:35:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) statfs(0x0, 0x0) [ 704.845060] kauditd_printk_skb: 4 callbacks suppressed [ 704.845075] audit: type=1326 audit(1544618117.852:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26864 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 704.876077] audit: type=1326 audit(1544618117.881:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26867 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 704.907734] audit: type=1326 audit(1544618117.881:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26865 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:18 executing program 1: syslog(0x3, &(0x7f00000000c0)=""/147, 0xfdba) 12:35:18 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 704.945003] audit: type=1326 audit(1544618117.911:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26868 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:18 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) write(r1, &(0x7f0000000000)="ff", 0x1) write$FUSE_GETXATTR(r0, &(0x7f0000000040)={0x18}, 0x18) ioctl$TCXONC(r3, 0x540a, 0x1) 12:35:18 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(0x0, &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt(r1, 0x6, 0x9, &(0x7f0000000100)="b6f41c51", 0x4) [ 705.654245] audit: type=1326 audit(1544618118.645:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26867 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 705.681443] audit: type=1326 audit(1544618118.685:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26865 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 705.713221] audit: type=1326 audit(1544618118.704:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26868 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:20 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) 12:35:20 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(0x0, &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, 0x0, 0x0) 12:35:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) chroot(0x0) 12:35:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140)) [ 707.955187] audit: type=1326 audit(1544618120.936:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26910 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:21 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(0x0, &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 707.992199] audit: type=1326 audit(1544618120.956:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26908 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 708.029143] audit: type=1326 audit(1544618120.956:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26909 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:21 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', 0x0, &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:21 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', 0x0, &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:21 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', 0x0, &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:21 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', 0x0, 0x0, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:21 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', 0x0, 0x0, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:24 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) write$binfmt_misc(r0, 0x0, 0x0) 12:35:24 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', 0x0, 0x0, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:24 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 12:35:24 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:35:24 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0xffffffffffffffbb, 0x859, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='stat\x00') ioctl$KDENABIO(r2, 0x4b36) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x48000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x80002, 0x109) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) rt_sigqueueinfo(r4, 0x2d, &(0x7f00000002c0)={0x2d, 0xeb48, 0xffc}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) socketpair(0xa, 0x0, 0x80, &(0x7f0000000400)={0xffffffffffffffff}) openat$cgroup_ro(r5, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='/dev/kvm\x00', 0xfffffffffffffff8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x40000e78f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) fanotify_init(0x20, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={"73797a6b616c6c65723000000500"}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000680)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f00000008c0)="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") ioctl$TCFLSH(r0, 0x5405, 0x709ffb) [ 711.098776] kauditd_printk_skb: 5 callbacks suppressed [ 711.098789] audit: type=1326 audit(1544618124.050:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26951 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) stat(&(0x7f0000000580)='.\x00', &(0x7f0000000500)) 12:35:24 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x0, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 711.154913] IPVS: ftp: loaded support on port[0] = 21 12:35:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fsetxattr(r1, &(0x7f0000000280)=@known='user.syz\x00', 0x0, 0x0, 0x0) fremovexattr(r1, &(0x7f0000000000)=@known='user.syz\x00') [ 711.274618] audit: type=1326 audit(1544618124.228:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26973 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:24 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x0, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 711.361510] device lo entered promiscuous mode [ 711.371376] Y­4`Ò˜: renamed from lo 12:35:24 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x0, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x8, 0x206000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x6, 0x8000, 0xff}, 0x2c) flistxattr(r0, 0x0, 0x0) [ 711.524795] audit: type=1326 audit(1544618124.476:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26989 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 711.529894] IPVS: ftp: loaded support on port[0] = 21 12:35:24 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x0, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:24 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x0, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:24 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x0, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 711.888885] audit: type=1326 audit(1544618124.843:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26951 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 712.068869] audit: type=1326 audit(1544618125.022:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26973 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 712.321984] audit: type=1326 audit(1544618125.270:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26989 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:27 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x0, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:27 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) setgroups(0x0, 0x0) 12:35:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) rt_sigaction(0x1b, 0x0, 0x0, 0x8, &(0x7f0000000240)) 12:35:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffffffffffdb}]}) munlock(&(0x7f000053d000/0x2000)=nil, 0x2000) 12:35:27 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0xffffffffffffffbb, 0x859, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='stat\x00') ioctl$KDENABIO(r2, 0x4b36) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x48000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x80002, 0x109) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) rt_sigqueueinfo(r4, 0x2d, &(0x7f00000002c0)={0x2d, 0xeb48, 0xffc}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) socketpair(0xa, 0x0, 0x80, &(0x7f0000000400)={0xffffffffffffffff}) openat$cgroup_ro(r5, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='/dev/kvm\x00', 0xfffffffffffffff8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x40000e78f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) fanotify_init(0x20, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={"73797a6b616c6c65723000000500"}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000680)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f00000008c0)="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") ioctl$TCFLSH(r0, 0x5405, 0x709ffb) [ 714.206216] audit: type=1326 audit(1544618127.144:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27013 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 714.258945] audit: type=1326 audit(1544618127.174:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27014 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 714.302858] IPVS: ftp: loaded support on port[0] = 21 12:35:27 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x0, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 714.330455] audit: type=1326 audit(1544618127.174:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27015 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:27 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:27 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x0, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0xffffffffffffffbb, 0x859, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='stat\x00') ioctl$KDENABIO(r2, 0x4b36) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x48000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x80002, 0x109) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) rt_sigqueueinfo(r4, 0x2d, &(0x7f00000002c0)={0x2d, 0xeb48, 0xffc}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) socketpair(0xa, 0x0, 0x80, &(0x7f0000000400)={0xffffffffffffffff}) openat$cgroup_ro(r5, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='/dev/kvm\x00', 0xfffffffffffffff8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x40000e78f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) fanotify_init(0x20, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={"73797a6b616c6c65723000000500"}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000680)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f00000008c0)="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") ioctl$TCFLSH(r0, 0x5405, 0x709ffb) 12:35:27 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x0, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 714.590499] IPVS: ftp: loaded support on port[0] = 21 12:35:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0xffffffffffffffbb, 0x859, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='stat\x00') ioctl$KDENABIO(r2, 0x4b36) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x48000000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x80002, 0x109) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000140)=0xc) rt_sigqueueinfo(r4, 0x2d, &(0x7f00000002c0)={0x2d, 0xeb48, 0xffc}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) socketpair(0xa, 0x0, 0x80, &(0x7f0000000400)={0xffffffffffffffff}) openat$cgroup_ro(r5, &(0x7f0000000600)='memory.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='/dev/kvm\x00', 0xfffffffffffffff8) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x40000e78f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfff7fffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10003, 0x80011, r6, 0x0) fanotify_init(0x20, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={"73797a6b616c6c65723000000500"}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f0000000680)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8923, &(0x7f00000008c0)="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") ioctl$TCFLSH(r0, 0x5405, 0x709ffb) 12:35:27 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x0, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 714.830751] IPVS: ftp: loaded support on port[0] = 21 [ 715.008194] audit: type=1326 audit(1544618127.927:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27013 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:28 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x0, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000600)={'ip_vti0\x00', 0x201e}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001fc0)={'ip6gretap0\x00', 0x0}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000040)={r2, 0x1, 0x6}, 0x10) dup2(r3, r1) 12:35:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffffffffffdb}]}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2) 12:35:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:35:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2000004, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)) 12:35:28 executing program 4: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='N', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000002c0)=@generic={0x2, "19cf9bc35a21fedbcf3487d08bc447c247f55ac0d566317abc071b7a8362b19a1e0f4557809dca61e83a0aa0964522c6a54a784c0279f1aa26e879c6d2e4a1ff70c36105e6ef719ff1d06b55aac8f4578af07dfde8ab63d2be8205d17f0aa4cfb08a4398e77c6e83d5e2e0273abdab226e46d117cbdb4c0c3c5cd1e23edc"}, 0x80, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)}], 0x1}, 0x0) close(r0) [ 715.193116] device ip6gretap0 entered promiscuous mode [ 715.220435] device ip6gretap0 left promiscuous mode 12:35:28 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:28 executing program 3: r0 = socket$kcm(0xa, 0x6, 0x0) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(r0, 0x541b, 0x0) 12:35:28 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6}, 0xa, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:28 executing program 4: r0 = socket$kcm(0x2, 0x1000000000000805, 0x84) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)='N', 0x1}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000002c0)=@generic={0x2, "19cf9bc35a21fedbcf3487d08bc447c247f55ac0d566317abc071b7a8362b19a1e0f4557809dca61e83a0aa0964522c6a54a784c0279f1aa26e879c6d2e4a1ff70c36105e6ef719ff1d06b55aac8f4578af07dfde8ab63d2be8205d17f0aa4cfb08a4398e77c6e83d5e2e0273abdab226e46d117cbdb4c0c3c5cd1e23edc"}, 0x80, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400)}], 0x1}, 0x0) close(r0) 12:35:28 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) 12:35:28 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6}, 0xa, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 12:35:28 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:29 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffffffffffdb}]}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2) 12:35:29 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6}, 0xa, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:29 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:29 executing program 1: mkdir(&(0x7f0000632000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000014ff8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x2200004, 0x0) 12:35:29 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0x66, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc21"}, 0x70, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f0000000000)=0x91, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 716.223652] kauditd_printk_skb: 8 callbacks suppressed [ 716.223666] audit: type=1326 audit(1544618129.137:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27119 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:29 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:29 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0x66, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc21"}, 0x70, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 716.436123] audit: type=1326 audit(1544618129.345:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27097 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:29 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) time(0x0) 12:35:29 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x1000000000016) [ 716.513838] audit: type=1326 audit(1544618129.405:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27100 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:29 executing program 3: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 12:35:29 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0x66, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc21"}, 0x70, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 716.666817] audit: type=1326 audit(1544618129.583:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27141 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:29 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x8002) ioctl$SG_IO(r0, 0x2285, &(0x7f00000014c0)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff7, 0x10000}) 12:35:29 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:29 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0x99, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d6"}, 0xa3, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:29 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) [ 717.066221] audit: type=1326 audit(1544618129.970:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27156 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x80000002, 0x0, 0x0, 0x0, 0x0, 0x100}) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 12:35:30 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0x99, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d6"}, 0xa3, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:30 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:30 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1bad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) [ 717.463583] audit: type=1326 audit(1544618130.367:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27141 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:30 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) time(0x0) 12:35:30 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0x99, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d6"}, 0xa3, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r1, 0x601}, 0x1c}}, 0x0) 12:35:30 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x1000000000016) [ 717.600690] audit: type=1326 audit(1544618130.496:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27191 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 717.871488] audit: type=1326 audit(1544618130.773:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27156 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) flock(0xffffffffffffffff, 0x0) 12:35:30 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xb2, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7"}, 0xbc, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000feb000/0x14000)=nil, 0x4) 12:35:30 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) tkill(r0, 0x1000000000016) 12:35:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) ioprio_get$uid(0x3, 0x0) [ 718.014362] audit: type=1326 audit(1544618130.912:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27202 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:30 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xb2, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7"}, 0xbc, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 718.058614] audit: type=1326 audit(1544618130.942:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27204 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:31 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) tkill(r0, 0x1000000000016) 12:35:31 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xb2, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7"}, 0xbc, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:31 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) fstatfs(r0, &(0x7f0000000100)=""/11) 12:35:31 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xbf, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09"}, 0xc9, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:31 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) tkill(r0, 0x1000000000016) 12:35:31 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xbf, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09"}, 0xc9, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:31 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xbf, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09"}, 0xc9, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:31 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:31 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) removexattr(0x0, 0x0) 12:35:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x33a}, 0x0) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1'}, 0x4) 12:35:31 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) tkill(r0, 0x1000000000016) 12:35:31 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:32 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xc5, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc53"}, 0xcf, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:32 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) tkill(0x0, 0x1000000000016) 12:35:32 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:32 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) read(r0, &(0x7f0000a16000)=""/71, 0x47) 12:35:32 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:32 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xc5, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc53"}, 0xcf, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:32 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/ipc\x00') setns(r0, 0x0) 12:35:32 executing program 0: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x4, 0x1, 0x0, &(0x7f000044b000), 0x0) 12:35:32 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:32 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xc5, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc53"}, 0xcf, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:32 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) 12:35:32 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:32 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xc8, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc53141002"}, 0xd2, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:33 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x800000000086, 0x0, 0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x0) 12:35:33 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:33 executing program 0: capset(&(0x7f00000fc000)={0x19980330}, &(0x7f000047efe8)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x1f, 0x0, 0x0) 12:35:33 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141045, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) write(r0, &(0x7f0000000000)='8', 0x1) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000001640)) 12:35:33 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xc8, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc53141002"}, 0xd2, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) listxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 12:35:33 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:33 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x1f, 0x0, 0x0) 12:35:33 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xc8, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc53141002"}, 0xd2, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) sched_yield() 12:35:33 executing program 3: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000000)) 12:35:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mprotect(&(0x7f0000009000/0xe000)=nil, 0xe000, 0x0) 12:35:33 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xca, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc531410023179"}, 0xd4, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:33 executing program 3: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:33 executing program 2: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[{0xc, 0x0, 0x7}], 0xc}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) 12:35:34 executing program 3: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) [ 721.292857] kauditd_printk_skb: 13 callbacks suppressed [ 721.292872] audit: type=1326 audit(1544618134.155:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27333 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:34 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) io_cancel(0x0, 0x0, 0x0) 12:35:34 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xca, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc531410023179"}, 0xd4, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:34 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141045, 0x0) close(r0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) write$smack_current(r0, 0x0, 0x0) set_mempolicy(0xc000, &(0x7f0000000040), 0x0) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, r0, 0x8000) write$eventfd(0xffffffffffffffff, 0x0, 0x0) 12:35:34 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:34 executing program 1: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0x7fffffff, 0x4) [ 721.338760] audit: type=1326 audit(1544618134.205:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27340 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:34 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xca, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc531410023179"}, 0xd4, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) creat(&(0x7f0000000200)='./file0\x00', 0x0) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 721.565177] audit: type=1326 audit(1544618134.433:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27392 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:34 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x1, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x7f, 0x0, 0xfffffffffffffffb}]}) 12:35:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 12:35:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) io_setup(0x1, &(0x7f00000002c0)=0x0) io_submit(r0, 0x0, 0x0) 12:35:34 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:34 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 721.907617] audit: type=1326 audit(1544618134.770:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27355 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 722.002446] audit: type=1326 audit(1544618134.869:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27400 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:34 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) [ 722.035640] audit: type=1326 audit(1544618134.889:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27399 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:34 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) [ 722.078997] audit: type=1326 audit(1544618134.939:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27410 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000080)) [ 722.130970] audit: type=1326 audit(1544618134.988:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27410 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:35 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:35 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x0) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) mkdir(&(0x7f0000632000)='./file0\x00', 0x0) statfs(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=""/38) [ 722.356571] audit: type=1326 audit(1544618135.216:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27433 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 722.384486] audit: type=1326 audit(1544618135.246:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27392 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x21, 0x0, 0x1fd) 12:35:35 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:35 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000001240)={@remote, 0x800, 0x0, 0x2000000000000ff, 0x100000000000001}, 0xf) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff, 0x2}, 0x20) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000180)={0x3, {0x2, 0x4e20, @empty}, {0x2, 0x4e24, @empty}, {0x2, 0x4e23, @loopback}, 0x78, 0xa1, 0x7, 0x3, 0x9, &(0x7f0000000140)='veth1\x00', 0x3, 0x1, 0x800}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x7, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e23, @empty}, {0x2, 0x4e22, @remote}, 0x54, 0x3, 0xffffffff, 0x4, 0x80000000, &(0x7f0000000000)='lo\x00', 0x0, 0x200, 0xffff}) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000200)={'gre0\x00', 0x36}) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000008c0)={0x0, {}, {}, {0x2, 0x0, @dev}, 0x1c, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)='bridge_slave_1\x00'}) timer_create(0x3, &(0x7f00000011c0)={0x0, 0x23, 0x1, @thr={&(0x7f0000000180)="9c3d484fc962ddc1ab92ea057bfa91168b0d27516a5cbba56597c64b72b4b1c6fe6d72c722a776d405d81caad63e80445a675e245389d5ac88e255c455aa", 0x0}}, &(0x7f0000001200)) get_robust_list(0x0, &(0x7f0000000140)=0x0, &(0x7f0000000000)=0xfffffffffffffee4) 12:35:35 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:35 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 12:35:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 12:35:35 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:35 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0) 12:35:35 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = gettid() rt_sigqueueinfo(r0, 0x0, &(0x7f0000000180)={0x0, 0x20, 0x9}) 12:35:36 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:36 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:36 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:36 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000340)="5500000018007f1dfd0000b2a4a280930a06000000a84308910000000e0008000a000c00060000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 12:35:36 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:36 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:36 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000040)="6c6f3a26b76051b159a9c84a2c60d29800000020") 12:35:36 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:36 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:36 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) 12:35:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) set_mempolicy(0x8002, &(0x7f0000000000)=0xffffffffffffffff, 0x1f) 12:35:37 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(0xffffffffffffffff, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 12:35:37 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:37 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000), 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:37 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) [ 724.389502] IPVS: ftp: loaded support on port[0] = 21 12:35:37 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) timer_create(0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, 0x0) 12:35:37 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000), 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:37 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 724.684769] netlink: 41 bytes leftover after parsing attributes in process `syz-executor2'. 12:35:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0xffffffff}]}) personality(0x0) 12:35:37 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000), 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:37 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 726.584013] IPVS: stopping master sync thread 15655 ... [ 726.596189] device bridge_slave_1 left promiscuous mode [ 726.603390] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.664541] device bridge_slave_0 left promiscuous mode [ 726.670163] bridge0: port 1(bridge_slave_0) entered disabled state [ 728.785587] team0 (unregistering): Port device team_slave_1 removed [ 728.797388] team0 (unregistering): Port device team_slave_0 removed [ 728.812504] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 728.878383] device bond_slave_0 left promiscuous mode [ 728.905148] bond0 (unregistering): Released all slaves [ 729.033865] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.040663] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.048021] device bridge_slave_0 entered promiscuous mode [ 729.081595] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.087977] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.095229] device bridge_slave_1 entered promiscuous mode [ 729.150130] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 729.207697] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 729.395847] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 729.455816] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 729.733455] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 729.741489] team0: Port device team_slave_0 added [ 729.792696] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 729.800845] team0: Port device team_slave_1 added [ 729.853699] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 729.910143] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 729.970038] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 729.977597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 729.988122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 730.050401] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 730.057971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 730.076127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 730.495868] bridge0: port 2(bridge_slave_1) entered blocking state [ 730.502313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 730.509064] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.515502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 730.523048] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 731.046107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 731.565841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 731.657965] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 731.749982] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 731.756202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 731.764225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 731.856923] 8021q: adding VLAN 0 to HW filter on device team0 [ 732.387243] kauditd_printk_skb: 13 callbacks suppressed [ 732.387258] audit: type=1326 audit(1544618145.173:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27812 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 733.192475] audit: type=1326 audit(1544618145.956:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27812 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:46 executing program 1: syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 12:35:46 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 12:35:46 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) readahead(0xffffffffffffffff, 0x0, 0x0) 12:35:46 executing program 2: 12:35:46 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @rand_addr=0x6143d65a}, {0x2, 0x0, @remote}, 0x4}) 12:35:46 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) write$P9_RREADDIR(r1, 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x8a) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) [ 733.290716] audit: type=1326 audit(1544618146.056:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27819 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5405, 0x0) 12:35:46 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x200002, 0x1, 0x0, 0x1}, 0x2c) 12:35:46 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) 12:35:46 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) socket(0x10, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x33a}, 0x100) 12:35:46 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x804}, 0x1c) 12:35:46 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) [ 733.576831] cgroup: fork rejected by pids controller in /syz2 12:35:46 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000a1aff7), 0x48f) 12:35:46 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) 12:35:46 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, 0x0, 0x0) 12:35:46 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x33a}, 0x100) 12:35:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) chown(&(0x7f0000000000)='.\x00', 0x0, 0x0) [ 734.091234] audit: type=1326 audit(1544618146.859:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27819 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 734.179609] audit: type=1326 audit(1544618146.938:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27869 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:47 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, 0x0, 0x0) 12:35:47 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000ac0)='./bus\x00', 0x0) open$dir(&(0x7f0000000980)='./file1\x00', 0xfffffffffffffffe, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000200)=@dstopts, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setfsuid(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setxattr$security_evm(&(0x7f0000000340)='./file1\x00', &(0x7f0000000540)='security.evm\x00', &(0x7f0000000580)=@v2={0x3, 0x3, 0x4, 0x6, 0xcb, "d2ba8ebde6103e972bb08620b34f9f938c94e4f7cd99e5d1ad55d0e119cd8344272afabdd2e316ccf7b11ccf067a85df609a0264d2bfe21e7cb9420982da05c7d416027abd66569455b26b58fbd86609c26c488298b8c9e28432e43abff688be372b7a6edc216815e4f45611e8155d552234696d8e7dd5e5ce9e5ffe43974621955020cd9ff5d4ce963b48700f3b1c1a90f5304af9e7aaa3d69bb00a6ade6a8f5913148b29db40b6e92ed98dfa07b84d61f7f9862d4872d6415f62feb48a09a8c350d0cc5314100231794a"}, 0xd5, 0x2) ftruncate(r2, 0x7fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x0) 12:35:47 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg(r0, &(0x7f0000002000)={&(0x7f0000001ec0)=@tipc=@name, 0x80, 0x0}, 0x0) 12:35:47 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, 0x0, 0x0) 12:35:47 executing program 4: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e0000000000000000000000000040000000000000000000000000000000000000000000380002000000000000000300000000000000000000000000000000000000000000000000000000000000f80000000000000000000000000000000000000000000000e865ce175af1c16e25a3ce6a3c8329676a3df50825509ebbaa3ffe848034c3c1a98ae900010100000054e7851690fd166ecafeafd2eb5600"], 0xb0) execveat(r0, &(0x7f0000000180)='\x00', 0x0, 0x0, 0x1000) 12:35:47 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) 12:35:47 executing program 0: io_setup(0x8, &(0x7f0000000080)=0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = dup(r1) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) 12:35:47 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffffffffdffb}]}) r0 = semget(0x2, 0x0, 0x0) semtimedop(r0, &(0x7f0000000240)=[{}], 0x1, 0x0) 12:35:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) 12:35:47 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) [ 734.596127] audit: type=1326 audit(1544618147.355:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27904 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 734.647100] audit: type=1326 audit(1544618147.404:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27909 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) [ 734.975540] audit: type=1326 audit(1544618147.732:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27869 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:47 executing program 2: write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 12:35:47 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) 12:35:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) unshare(0x8000400) r0 = mq_open(&(0x7f00000000c0)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r0, 0x0) [ 735.080208] audit: type=1326 audit(1544618147.841:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27923 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:47 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000340)="59000000140019232b834b80043f679a10ff6400940005002a925aaa000000000100008400f0fffeff2c707f8f00ff050000000010000100090a1000410400000000fcff00000000000000000000000000000000000000000f", 0x59}], 0x1) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:35:47 executing program 2: r0 = timerfd_create(0x0, 0x80800) read(r0, &(0x7f0000a16000)=""/71, 0x47) [ 735.123951] audit: type=1326 audit(1544618147.860:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27924 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:48 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x1000000000031, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) 12:35:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x33a}, 0x100) 12:35:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 12:35:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:35:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffc, 0x0, 0x820000, 0x0, 0x0, [0x8000000000000000]}, 0x2c) 12:35:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffc, 0x0, 0x820000, 0x0, 0x0, [0x8000000000000000]}, 0x2c) 12:35:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x100000000014, 0x4, 0x8, 0x100}, 0x2c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080), 0x0}, 0x18) 12:35:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffc, 0x0, 0x820000, 0x0, 0x0, [0x8000000000000000]}, 0x2c) 12:35:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) unshare(0x8000400) r0 = mq_open(&(0x7f00000000c0)='-$\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) mq_notify(r0, 0x0) 12:35:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffc, 0x0, 0x820000, 0x0, 0x0, [0x8000000000000000]}, 0x2c) 12:35:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffc, 0x0, 0x820000, 0x0, 0x0, [0x8000000000000000]}, 0x2c) 12:35:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x100000000014, 0x4, 0x8, 0x100}, 0x2c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080), 0x0}, 0x18) 12:35:49 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x7, 0x7f, 0x5, 0x7, 0x20, r5, 0x122b}, 0x2c) socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) recvmsg$kcm(r0, &(0x7f0000008b40)={&(0x7f0000006580)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f00000089c0)=[{&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/105, 0x69}, {&(0x7f0000008680)=""/179, 0xb3}, {&(0x7f0000008740)=""/12, 0xc}, {&(0x7f0000008780)=""/133, 0x85}, {&(0x7f0000008840)=""/70, 0x46}, {&(0x7f00000088c0)=""/176, 0xb0}, {&(0x7f0000008980)=""/19, 0x13}], 0x9, &(0x7f0000008a80)=""/165, 0xa5}, 0x102) bpf$PROG_LOAD(0x5, &(0x7f0000008b80)={0xe, 0x5, &(0x7f0000000340)=@raw=[@call={0x85, 0x0, 0x0, 0x42}, @exit, @alu={0x7, 0x1, 0xb, 0x7, 0x9, 0x50, 0xfffffffffffffff0}, @exit, @generic={0x80, 0x8, 0xfffffffffffffffe, 0xf9b, 0x3f}], &(0x7f0000000380)='GPL\x00', 0x1ff, 0x0, 0x0, 0x41f00, 0x1, [], r8, 0xf}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r7}) r9 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3, 0xffffffffffffffc1, 0x1, 0x20, 0x0, 0x1000, 0x10000, 0x1, 0x2, 0x8000, 0x10000, 0x47, 0x6cb, 0xf7b, 0x3ff, 0x2, 0x80000000, 0x7, 0x0, 0x7, 0x2, 0x8, 0xc461, 0x8, 0x3, 0x9, 0x81, 0x7, 0x5, 0x1, 0x922c, 0x8, 0x75, 0x80000000, 0x101, 0x3, 0x0, 0xfffffffffffffff8, 0x3, @perf_config_ext={0xfffffffffffffeff, 0x2}, 0x6, 0x2, 0x3, 0x0, 0x1, 0x5, 0x800}, 0x0, 0xf, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000002c0)=',\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) 12:35:49 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x60030000000000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:35:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000280)) 12:35:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x270) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='bond0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000005e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[{0x10, 0x29}], 0x10}}], 0x1, 0x0) [ 736.474016] device lo entered promiscuous mode 12:35:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x5, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:49 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timerfd_gettime(0xffffffffffffffff, 0x0) inotify_init() execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000200)={0x0, r1+10000000}, 0x0) tkill(r0, 0x15) 12:35:49 executing program 4: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x60030000000000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:35:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x5, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) open(&(0x7f000000fffa)='./bus\x00', 0x800141042, 0x0) unlink(&(0x7f0000000000)='./bus\x00') 12:35:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r1, 0x0, 0x0) write$binfmt_script(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000a8cff0)={0x1, &(0x7f0000528000)=[{0x6}]}, 0x10) close(r0) 12:35:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x5, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x5, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:50 executing program 1: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = socket$kcm(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x7, 0x7f, 0x5, 0x7, 0x20, r5, 0x122b}, 0x2c) socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) recvmsg$kcm(r0, &(0x7f0000008b40)={&(0x7f0000006580)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f00000089c0)=[{&(0x7f0000006600)=""/4096, 0x1000}, {&(0x7f0000007600)=""/4096, 0x1000}, {&(0x7f0000008600)=""/105, 0x69}, {&(0x7f0000008680)=""/179, 0xb3}, {&(0x7f0000008740)=""/12, 0xc}, {&(0x7f0000008780)=""/133, 0x85}, {&(0x7f0000008840)=""/70, 0x46}, {&(0x7f00000088c0)=""/176, 0xb0}, {&(0x7f0000008980)=""/19, 0x13}], 0x9, &(0x7f0000008a80)=""/165, 0xa5}, 0x102) bpf$PROG_LOAD(0x5, &(0x7f0000008b80)={0xe, 0x5, &(0x7f0000000340)=@raw=[@call={0x85, 0x0, 0x0, 0x42}, @exit, @alu={0x7, 0x1, 0xb, 0x7, 0x9, 0x50, 0xfffffffffffffff0}, @exit, @generic={0x80, 0x8, 0xfffffffffffffffe, 0xf9b, 0x3f}], &(0x7f0000000380)='GPL\x00', 0x1ff, 0x0, 0x0, 0x41f00, 0x1, [], r8, 0xf}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x8916, &(0x7f0000000000)={r7}) r9 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3, 0xffffffffffffffc1, 0x1, 0x20, 0x0, 0x1000, 0x10000, 0x1, 0x2, 0x8000, 0x10000, 0x47, 0x6cb, 0xf7b, 0x3ff, 0x2, 0x80000000, 0x7, 0x0, 0x7, 0x2, 0x8, 0xc461, 0x8, 0x3, 0x9, 0x81, 0x7, 0x5, 0x1, 0x922c, 0x8, 0x75, 0x80000000, 0x101, 0x3, 0x0, 0xfffffffffffffff8, 0x3, @perf_config_ext={0xfffffffffffffeff, 0x2}, 0x6, 0x2, 0x3, 0x0, 0x1, 0x5, 0x800}, 0x0, 0xf, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000002c0)=',\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r10) 12:35:50 executing program 4: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) 12:35:50 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000240)={0x0, 0x8000}) 12:35:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000600)=0x5, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_to_team\x00', 0x70) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) 12:35:50 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timerfd_gettime(0xffffffffffffffff, 0x0) inotify_init() execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000200)={0x0, r1+10000000}, 0x0) tkill(r0, 0x15) 12:35:50 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023cffffff7fa070") r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x100000008936, &(0x7f0000000000)) 12:35:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f0000001040)) 12:35:50 executing program 4: r0 = socket(0x2, 0x4001, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1, &(0x7f0000000040)=0x8001, 0x4) connect$unix(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="82022e2fe7f966696c6514a23faddcd0f0d39a0018d35182a5a039b88e94124b20e10e0f6a6223509e2b184d77e3380600000000000000d1d2cd689f076cf7"], 0x1) 12:35:50 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffff}]}) capget(&(0x7f00000001c0)={0x20080522}, 0x0) [ 737.822274] kauditd_printk_skb: 11 callbacks suppressed [ 737.822288] audit: type=1326 audit(1544618150.558:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28038 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 [ 737.910442] audit: type=1326 audit(1544618150.637:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28087 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:50 executing program 1: io_setup(0x1080000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 12:35:50 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timerfd_gettime(0xffffffffffffffff, 0x0) inotify_init() execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000200)={0x0, r1+10000000}, 0x0) tkill(r0, 0x15) 12:35:50 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"76657400000000000000000400"}) 12:35:50 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:50 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) 12:35:50 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x3, 0x0, [0x0, 0x20000580, 0x20000740, 0x20001128], 0x0, &(0x7f00000004c0)}, 0x78) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x617, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) io_setup(0x40000100000402, &(0x7f0000000340)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 12:35:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x48) 12:35:51 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:51 executing program 1: r0 = socket$inet(0x2, 0x80003, 0x2000000080) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x10) recvmmsg(r0, &(0x7f0000002c00)=[{{&(0x7f0000000180)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) 12:35:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) pipe(&(0x7f00000003c0)) syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) creat(0x0, 0x0) 12:35:51 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x103f, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timerfd_gettime(0xffffffffffffffff, 0x0) inotify_init() execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) nanosleep(&(0x7f0000000200)={0x0, r1+10000000}, 0x0) tkill(r0, 0x15) [ 738.710506] audit: type=1326 audit(1544618151.440:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28087 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:51 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = socket(0xa, 0x80001, 0x0) io_setup(0x4000000000007, &(0x7f0000000140)=0x0) io_submit(r1, 0x2, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000080), 0x121}]) 12:35:51 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:51 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000300)={0x0, @aes128, 0x2, "96ff3d8d93ecb0c0"}) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000004, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000004c0)='\\eth0\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r6, &(0x7f0000000040), 0x0, 0x1}, 0xfffffffffffffe99) unlink(&(0x7f00000002c0)='./file0\x00') utimes(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) r7 = memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) accept4(r4, 0x0, &(0x7f00000000c0), 0x80800) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000003c0)=0x54) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0xfffffde5, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e20, @remote}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002110, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r7, 0x0, 0x2, &(0x7f0000000440)="0100", 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000006c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x200, 0x4, 0x5670, 0x2, 0x7fff, 0x8, 0x4, 0x6e, 0x1479, 0x80000001, 0x62ba7cbe, 0x3, 0xfb46, 0x9, 0x80, 0xffffffff, 0x7f, 0xfffffffffffffffb, 0x7, 0x7, 0x7fff, 0x7, 0x1ff, 0x6, 0x3, 0xffff, 0x7, 0x2, 0xdd6, 0x1000, 0x0, 0xffffffff, 0x3, @perf_config_ext={0x85b, 0x4}, 0xa00, 0x200, 0x10000, 0x2, 0x4, 0x800, 0x2}, r8, 0x7, r5, 0x9) prctl$PR_MCE_KILL_GET(0x22) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r6, &(0x7f0000000380), 0x0}, 0x18) 12:35:51 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='tmpfs\x00', 0x0, 0x0) r0 = inotify_init() mknod(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x200) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 12:35:51 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:51 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x100000000000019b, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/icmp6\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000113, 0x0) 12:35:51 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000300)={0x0, @aes128, 0x2, "96ff3d8d93ecb0c0"}) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000004, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000004c0)='\\eth0\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r6, &(0x7f0000000040), 0x0, 0x1}, 0xfffffffffffffe99) unlink(&(0x7f00000002c0)='./file0\x00') utimes(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) r7 = memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) accept4(r4, 0x0, &(0x7f00000000c0), 0x80800) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000003c0)=0x54) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0xfffffde5, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e20, @remote}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002110, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r7, 0x0, 0x2, &(0x7f0000000440)="0100", 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000006c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x200, 0x4, 0x5670, 0x2, 0x7fff, 0x8, 0x4, 0x6e, 0x1479, 0x80000001, 0x62ba7cbe, 0x3, 0xfb46, 0x9, 0x80, 0xffffffff, 0x7f, 0xfffffffffffffffb, 0x7, 0x7, 0x7fff, 0x7, 0x1ff, 0x6, 0x3, 0xffff, 0x7, 0x2, 0xdd6, 0x1000, 0x0, 0xffffffff, 0x3, @perf_config_ext={0x85b, 0x4}, 0xa00, 0x200, 0x10000, 0x2, 0x4, 0x800, 0x2}, r8, 0x7, r5, 0x9) prctl$PR_MCE_KILL_GET(0x22) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r6, &(0x7f0000000380), 0x0}, 0x18) 12:35:51 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x3, 0x0, [0x0, 0x20000580, 0x20000740, 0x20001128], 0x0, &(0x7f00000004c0)}, 0x78) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x617, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) io_setup(0x40000100000402, &(0x7f0000000340)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 12:35:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x2c, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @local}]}, 0x2c}}, 0x0) 12:35:52 executing program 1: add_key(&(0x7f0000000100)='logon\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 12:35:52 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000300)={0x0, @aes128, 0x2, "96ff3d8d93ecb0c0"}) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000004, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000004c0)='\\eth0\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r6, &(0x7f0000000040), 0x0, 0x1}, 0xfffffffffffffe99) unlink(&(0x7f00000002c0)='./file0\x00') utimes(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) r7 = memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) accept4(r4, 0x0, &(0x7f00000000c0), 0x80800) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000003c0)=0x54) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0xfffffde5, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e20, @remote}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002110, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r7, 0x0, 0x2, &(0x7f0000000440)="0100", 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000006c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x200, 0x4, 0x5670, 0x2, 0x7fff, 0x8, 0x4, 0x6e, 0x1479, 0x80000001, 0x62ba7cbe, 0x3, 0xfb46, 0x9, 0x80, 0xffffffff, 0x7f, 0xfffffffffffffffb, 0x7, 0x7, 0x7fff, 0x7, 0x1ff, 0x6, 0x3, 0xffff, 0x7, 0x2, 0xdd6, 0x1000, 0x0, 0xffffffff, 0x3, @perf_config_ext={0x85b, 0x4}, 0xa00, 0x200, 0x10000, 0x2, 0x4, 0x800, 0x2}, r8, 0x7, r5, 0x9) prctl$PR_MCE_KILL_GET(0x22) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r6, &(0x7f0000000380), 0x0}, 0x18) 12:35:52 executing program 5: socketpair(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x3, 0x0, [0x0, 0x20000580, 0x20000740, 0x20001128], 0x0, &(0x7f00000004c0)}, 0x78) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x617, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) io_setup(0x40000100000402, &(0x7f0000000340)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 12:35:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:52 executing program 2: rt_sigsuspend(&(0x7f0000000040)={0x136}, 0x8) 12:35:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:52 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) rmdir(&(0x7f0000000380)='./file0\x00') 12:35:52 executing program 4: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000300)={0x0, @aes128, 0x2, "96ff3d8d93ecb0c0"}) sendto$inet6(r2, &(0x7f0000000040), 0x0, 0x20000004, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000004c0)='\\eth0\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r6, &(0x7f0000000040), 0x0, 0x1}, 0xfffffffffffffe99) unlink(&(0x7f00000002c0)='./file0\x00') utimes(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) r7 = memfd_create(&(0x7f0000000080)='!proccgroup\x00', 0x0) accept4(r4, 0x0, &(0x7f00000000c0), 0x80800) ioctl$BLKGETSIZE(r4, 0x1260, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x8000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz0\x00', 0x200002, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'raw\x00'}, &(0x7f00000003c0)=0x54) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0xfffffde5, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000040)={'ipddp0\x00', {0x2, 0x4e20, @remote}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x8020002110, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, r7, 0x0, 0x2, &(0x7f0000000440)="0100", 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000006c0)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x200, 0x4, 0x5670, 0x2, 0x7fff, 0x8, 0x4, 0x6e, 0x1479, 0x80000001, 0x62ba7cbe, 0x3, 0xfb46, 0x9, 0x80, 0xffffffff, 0x7f, 0xfffffffffffffffb, 0x7, 0x7, 0x7fff, 0x7, 0x1ff, 0x6, 0x3, 0xffff, 0x7, 0x2, 0xdd6, 0x1000, 0x0, 0xffffffff, 0x3, @perf_config_ext={0x85b, 0x4}, 0xa00, 0x200, 0x10000, 0x2, 0x4, 0x800, 0x2}, r8, 0x7, r5, 0x9) prctl$PR_MCE_KILL_GET(0x22) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r6, &(0x7f0000000380), 0x0}, 0x18) 12:35:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:52 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x6100, 0x0) 12:35:52 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:35:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:52 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000140)) 12:35:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:53 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000e77fff), 0x0, 0x20000008, 0x0, 0x0) 12:35:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80082, 0x0) write$tun(r0, 0x0, 0x0) 12:35:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0xe, 0x4, 0x320, 0x0, 0x0, 0x0, 0x1268, 0x0, 0x1358, 0x1358, 0x1358, 0x1358, 0x1358, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0x108}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "3c42acf7b6c88559e63300c07b5cefa8acb939ea7a9d3be801c3ec376e55611e6409c0456aba9c155cbd2729a365ec8c9d66e48a0b53e0060a0ab2ad55ae1ba1"}}}, {{@ip={@broadcast, @loopback, 0x0, 0x0, 'bridge_slave_1\x00', 'veth1_to_team\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x380) 12:35:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:35:53 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)) 12:35:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000300), 0x4) 12:35:53 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 12:35:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@nat={"6e617400ff003f000000000000000000000000000000000000000a00", 0x19, 0x1, 0x1d0, [0x20000080, 0x2000000000000000, 0x0, 0x200000b0, 0x20000220], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="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"]}, 0x248) 12:35:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000fff000/0x1000)=nil}) 12:35:53 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000002c0)) 12:35:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:35:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000300), 0x4) 12:35:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, 0x0) [ 740.788233] xt_nfacct: accounting object `syz1' does not exists [ 740.841117] xt_nfacct: accounting object `syz1' does not exists 12:35:53 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) prctl$PR_GET_UNALIGN(0x5, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000940), 0x24, 0x0) 12:35:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) pipe(&(0x7f00000003c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:35:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:35:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="d9bc34f6a3d1d27d41132d06e7af100a", 0x10) 12:35:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, 0x0) 12:35:53 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) 12:35:53 executing program 4: semget(0x1, 0x6, 0x0) 12:35:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000001b80)={'security\x00', 0x4, "5b0dccb5"}, 0x0) 12:35:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:53 executing program 5: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') sendfile(r0, r1, 0x0, 0x14a) 12:35:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, 0x0) 12:35:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'eql\x00', 0xfffffffffffffffd}) 12:35:54 executing program 0: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:54 executing program 4: keyctl$join(0x1, 0x0) keyctl$join(0x1, 0x0) 12:35:54 executing program 5: sysfs$1(0x1, &(0x7f0000000040)='bdev\x00') 12:35:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000180)={0x2, 'veth0\x00'}, 0x18) 12:35:54 executing program 0: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) [ 741.584202] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth0, syncid = 0, id = 0 12:35:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x4005, 0x0) 12:35:54 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x3c1, 0x3, 0x90, [0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) 12:35:54 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) 12:35:54 executing program 4: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev, 0x0, 0x0, 0x0, 0xf}, 0x0) 12:35:54 executing program 0: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:54 executing program 3: r0 = creat(&(0x7f00000006c0)='./bus\x00', 0x0) signalfd4(r0, &(0x7f0000000080), 0x8, 0x0) 12:35:54 executing program 0: r0 = socket(0x0, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$alg(r1, 0x0, 0x0, 0x0) 12:35:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000700)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x116, &(0x7f0000000d80)}}], 0x6d7, 0x40400d4) [ 742.077856] kernel msg: ebtables bug: please report to author: bad policy 12:35:54 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000100000000000000d7"], 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) 12:35:54 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x3c1, 0x3, 0x90, [0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=[{}, {}, {0x0, '\x00', 0x1}]}, 0x108) 12:35:54 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = inotify_init() r3 = inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x20000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) inotify_rm_watch(r2, r3) [ 742.249345] kernel msg: ebtables bug: please report to author: bad policy 12:35:54 executing program 0: r0 = socket(0x0, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:54 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="280000000400000000000000000000000000000004489a61898a88b900d30e000000000000000000caef1638cc1a960abf82c67093a908b91869a511074807d43de628bf49385b473e5f52fcd278a4cf65221baa1ec3e759574cb7a10c405181d2527ec9f785844dec688cf7ab6eb43bd332c3299113d32c44fb12d488a682cbab1c381aeeee19cc6f6cc11abef9827b5023d71d80c131ec0a6a773b5eddf92102dd7ac0ea22db"], 0xa7) [ 742.281166] audit: type=1326 audit(1544618154.981:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28371 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:35:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) 12:35:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x40800000000031, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000080)) 12:35:55 executing program 0: r0 = socket(0x0, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) tkill(r0, 0x9) 12:35:55 executing program 0: r0 = socket(0xa, 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:55 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0xaf, 0x0, &(0x7f0000000280)=""/175}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) close(r0) write$cgroup_pid(r2, &(0x7f0000000000), 0x1a00) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'bond_slave_0\x00'}) r3 = socket$kcm(0x2, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 12:35:55 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) tkill(r0, 0x9) 12:35:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x33a}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 12:35:56 executing program 0: r0 = socket(0xa, 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) tkill(r0, 0x9) 12:35:56 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:35:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086610, 0x400002) 12:35:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() write(0xffffffffffffffff, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:35:56 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='user.syz\x00', &(0x7f00000000c0)="75731561e2ab4458b3", 0xff7e, 0x0) 12:35:56 executing program 0: r0 = socket(0xa, 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:35:56 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:35:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:35:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() write(0xffffffffffffffff, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:35:56 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:35:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x33a}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 12:35:56 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() write(0xffffffffffffffff, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:35:56 executing program 0: socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) [ 743.960908] IPVS: ftp: loaded support on port[0] = 21 12:35:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) [ 746.026642] bridge0: port 1(bridge_slave_0) entered blocking state [ 746.033234] bridge0: port 1(bridge_slave_0) entered disabled state [ 746.040861] device bridge_slave_0 entered promiscuous mode [ 746.051260] IPVS: stopping master sync thread 15624 ... [ 746.058566] device bridge_slave_1 left promiscuous mode [ 746.064439] bridge0: port 2(bridge_slave_1) entered disabled state [ 746.111561] device bridge_slave_0 left promiscuous mode [ 746.117011] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.434546] team0 (unregistering): Port device team_slave_1 removed [ 748.446435] team0 (unregistering): Port device team_slave_0 removed [ 748.461150] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 748.503295] bond0 (unregistering): Released all slaves [ 748.618651] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.625434] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.633020] device bridge_slave_1 entered promiscuous mode [ 748.668323] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 748.704911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 748.811473] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 748.862196] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 749.089005] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 749.098644] team0: Port device team_slave_0 added [ 749.142478] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 749.150167] team0: Port device team_slave_1 added [ 749.194647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 749.246199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 749.293745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 749.301298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 749.318817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 749.359821] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 749.367172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 749.384761] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 749.881863] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.888368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 749.895172] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.901579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 749.911625] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 750.739358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 751.140240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 751.237403] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 751.333244] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 751.339541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 751.347478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 751.440294] 8021q: adding VLAN 0 to HW filter on device team0 12:36:04 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, 0x0) tkill(0x0, 0x9) 12:36:04 executing program 0: socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:36:04 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:04 executing program 2: 12:36:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x33a}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 12:36:04 executing program 0: socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:36:04 executing program 2: 12:36:04 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:04 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:36:04 executing program 2: 12:36:05 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, 0x0) tkill(0x0, 0x9) 12:36:05 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:36:05 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:05 executing program 2: 12:36:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x81, 0x389) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000003c0)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x33a}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='bbr\x00', 0x4) 12:36:05 executing program 2: 12:36:05 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000940)=""/100, &(0x7f0000000100)=0x64) 12:36:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:05 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:05 executing program 2: 12:36:05 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, &(0x7f0000000100)) 12:36:06 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, 0x0) tkill(0x0, 0x9) 12:36:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:06 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2d, 'pids'}]}, 0x6) 12:36:06 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, &(0x7f0000000100)) 12:36:06 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="fa0c000016008152915a655267d7d137ab2ff96e27bf28b285fe3903a44a6017edcaa3a2b4dade3baee72569b51366463fedf5e787c05b0cb5927a3a7edfb4d078e9ae1504d489e058be9fafaa633705b6d4bf6a01f2cd9ebf19724a1b0b9760612582bccd3983ce4474844c065e914dab8bbd52a45f431678bfe28633bf7c8dc83df809238ed87f1e393883ef750ce79c6f84e5e5de176e2f26024e4e3a3d8fbdaf3254022f265d8ccc5fd7205d9d9c2c407ec58162523082d81a39c43f782332ba8e82b4107a049cb82bba8b5edd80473844291437b8d22edca68047582e6be601e9df5e60a32c7cd202c5a30b8b606e43362739551cbb013b65e238f41cc00d7900140cf06b7bc9030f2563bcf9d4f4b7f48c79ec1a323d06276a0a3f8846b7c62b66f9709cabcaad234c53f3bc9b11165a6321f1db1057f076cfaebf8fbfa033fdc1dc2c3e314b36b3b3dd50425447da8bc5938ff7a17361100ab0b1ffeab7ac487411824224781eb9cdd4edef57ae91cd61f56a56c0599cfc3a491447207610f242da6cd6b030ae5f35e3181c44ae68665a023759b9ef4358db46107edc49194aed72b62600ec0ae4fc9065be059fc010cd6e6c9ea77c666b5e25693fbcf595e3e57113ff3a0e0c63d0604a16ea5adb8b7b54d47d4d8804612fde571863064528a49bf684d8a880a11afd819f186c177c49cac3ba1e9d1aa7ad0ff36b9e36d73c05b8abcaf96df0bacd2c9653f30ec29e1284af8749a9b2803c2727e992a6e65df192e1875c3e6d3553ffb7cb34ffee8f8ac0123c390454b42a0316952cbc9949376d9320ec207f77c2d5eb9e86d720cf8e9008a9a51932b45cd4cab21414c92d1c20f9e15e3fc16c7ce181e9ab19b01b70343934c823b1215e173405dd225233823cd4a604a77f06b14eb05b860e6cf8790335788c43abe9de1598e9952e5c7e6b2f8b17b1008ff3033e7d1635b008834bdf4054e6195e55000827c6202b227dde06f23ae21c00b371bdb6b7ea47b2e78844b52a77f9f0929790dcd7df2752e4af092d539c87c18751a5eb3eb4d38a2a0e070064b4ffaacff0543b115cc89f6c7e78f12147ebfcf1c80bac8f98deb59cbe670adb4cd1882a7e0ca4ba85ae9d445223ffb32301d46c0c9b05a830cbea0f72294ab3b539e4ed7cac2e22b235e8ceedeb643fb90b061a58368e76036ff3c1828d8a4e21288662afb6f2acab00d734db7ffc8373a928571819ce9ea6cb0956a6093b2b1f65662b76bc6ac8a171451714e1d0e4ff76470c7651d3cf16f37cb5547317e4fef51e4fb471de6ffbb90c2dd4a64266c4c2f75fc62e58ec306fb92212fb262d8b138899a3b53e67cde2f97d94cd2265cc04d32b29edf77e75b1f88372495cb2937f183bfc8604d72efb3af5c1f41b665b25592676b0ad2185478eade7e663e743e0e09cce6224c787ce1d789dc4a9b350bfe3a75f551341b11dd96cdaea17989dad565b16324a69842dc29a0ed16744ea5935598ac8238e146139189927a14d3b2863044b63b468ae75f48fab68ad235c36daffebfe4b468fc9b13198b1a683dcd3b3b4294ba22caddbacf8792d5783bc12e2538e4609e6bb6e9eeab98a06452c252a657f400260458c29fae8879097698c9aba2b2d889fc78f00d0d8271e09e8542b71018be6ff8cb03cb423e79303047d6ce124a00f64461b899bbddc4fe87ff677533391e16c01fa9cd6420bdc856c4c7f057b249ee9817efd6ab2cd02eb887d2631435ef2d5a1c7e57ac046ef615a1285ca89ade18ae69af3b3f8f76ca8aa060e373c0f99424fe1c5fadc72fe145fd2d4e4da4b78597890516857de188fcdaf15e3b0871b346cd39ab772cc25fab49e60c818cde934b137144adfc4fbde3ddbeccce9679f02b66746e822c67b3ed5fdafb4a936a2683b39a002115ecd62220605ca542610a80f2e3530aa89d3ed6ed9c57bbfd5db3a0b62786a608309a355443c616032008f9458b2f10db93e29470192370084e9322c309c9b23333b46d04e79176659503ad4b05deebb3c67d715ee6e84a89002ea6f7f71bf41ad36b42c8ae01c97174dbb641e50641aba60c291a84e906c013087370a5043e07d36fcead378f6c1e6ed3f5ac695124b82b20261cf7c9b82172e09c81d7d39eed72aee5678613a3c671ddd44f2c7c75a3b5d316aa165d56594fccab20903d7f503a08928e76c779918b2463b720ee6367a43e494a1db3ed1a80690e665570c01ce7eb979cdd95d4e1ca51730eb2cd63ffb2a56049601627c9788254945142dce85adbe1eb5997d16cdfe2a3758b13dc6bb121e2206ae64206868c1c5e89a101bc121719ac435dcad093f5f67cefd863cc7c8f3fc8a9dc62a83c115f1ce714b18af067951aa06dd9bb4ed98a820bf4704d156977caa4e6415b2a0df0386e2f6a061bf44abc8a397cf4abdafc51b78ebec9831f3c60fde6e62a1fd082903080aef20ff8de8bc0dced06f627514600539ca7114a088848da4244a85b4cf5b976d3a698c9a568d417e276917baba05d1a02181db2e6cc35986da4ccc63f8cd8e85a4a923dd27e2f499664601fdc44fdf46e2d2880cd5a7ece89c370234c438dcc0b43865cc62bad21e9dc37da758cbe01752f02fd9cbfe98630a30a78bb1239e25cdaba3d45d13cd3e7216d9d8070f3ff1a0cd9a0c91f29974c98f2677ba88c1091bde4be0cd37ea5eeb3b9cd59560a00ddd40bbd60ffb8d4daa973ef0977c18dd4b38a605cee957872dca85787c37b6931293eddb77015faf143d1d28d24822d1a5d134799e8175a38b255aaf0e39b68c7f734e2e1e7044626daa84c9113e86d86ef63c86010000000000000061dcf516c32d49478f7af30d52baa18ea6b0fc286c06b7e4ee019bf3fe74845a652d4a52aaa241a189c411e90e2953863a2bc4124e573607b94cdff19e280731824931a83f056cb5857672619b97ce38081592c0c319ce72e04e9eadce89775cfb5a4b2842663bc79bde565435cbcd46c4d505ceef7dde86512d39d4cb270deb7e79ebf8602bdc0d76c3e833d36ee08be10be634f44056c2f3fd6a328c7cd562e9c96ff7845fc3df81a876bb07f1cc833bed6ca1dc5cf935a4e959db6a4fae6edbc45357d8758faa9cd04cd41eb6efcfbd91658519bf520b90107f767d126854818485e98cb7ef56804de6950bf4e72098a949d14ea0e4e9f2534cf16cac0aeb970fc5c39f37e93910d5c99ac163792260d2280ec5c9a79bf295588ec23f524aae65f800f9c39e338f3d66b1a69e5488e04823eab36ae6ec6a2c5ce133ccd819a2b217b1ab7f4afd1697bb42929b3131358b5421c83f925571934442d0fd0ce3990d4e5d31d8b956f76df3c2f8533e46b892c88692ce009155dd5c7dbe4c86874b95762650f63e4b4aabb41320978b05b80cfe8fa2830904ef6b5c4f7ad46ca5dac151c9077c4d2c6adfe5066a8eb09a9bc6892330ea2b259a53c7137f8498254e1b04bf920c35c5333c4d640b11da60917ae921037b4aedbd6a0fbeeaf88ef6defc830552b4cbe3fe2a844806a48923dd428ea1c8d797bd8e6aabd1d1a8c97c8038b627120a77f4e47fa1f788aa9da268b0ec10fc453cb722685df76547dbf55a16663aa2b2a51e9c52456cccdf682592d1369dd12e3d3cb504e0f2d7004e62c297d5a25d0298045dae8fca8cb795ea57288b85a7e705820087d55ca6c42e920e2aa1174e128622cf64a197fd728cb2949536ba63e8bda8589261f1377caea37302e47228d3708a5666c66ba711d3c0b310a8c47e86d26597299d523c28c90e4feab43e950f398f7b61ccf7e6490d75ba6d8214e2d5ef2d7a088db490e1ebacf4e6eecc896cb1c704f0a8fcdf4ccb5dfa53eaf43d709287f36c10188c19fd59da7d73494de089c1b0a69ee22dcb847001c5317846a876bee1685d11c4db0673ec4c3a12008bb719650525b3c39e2b0469edda93830b3f1bde3e5b0b4637197866bb08c5858cf0d9876e3c7cad54169887bf9c80f9f4be362e1bc8c27f3434e9a918bac355c184bd899b9aebe6be20e70c0c69234342eb8b57aa9ffb7797a32df91cec2bbc90201658ca2297bf1fe68e65363867e1f6ad79b827f363d64fbd3b188d95307d011c4ce5bf4407908c058eeb97ec98dd0ebfdab6b348fa387f2a7573cac25344c983e8fd526c30ee6d59fe99a30c7d7e2864aa22bfa49df5f32da68309cab3ed9c2ce69b6ecb8508ce28a43ebd6c809b8afd07a4606e664965d316f3707a3abee9bcdc32a78031b0171fb565d90c16cd56e5792c0cf618b799715f32538e38f493d4e19ec76fc8a07576a13975706bfc2bb1516c2d18a4385cc37a206eac6c9fb8d073576a1f56d529e407154fdd0c40d079ae44962c26743b4bf5950ac5ee34c5d7bd60b364ce670958112c37b9829bed7e1327356d6b94af3ba020c2337b2dba37d00af8a128a614390cdde62ce871f948427fb5c187df9a1540a5cc71da1a86144acbfd94bf433f744f0c4f2a675eba3ed251c5b11b08dfefc726c0394a9b75121d88467ed4b2cd69819dfe50693a4a4c8370d3af12f41c0067283bbb5a90044a340fc357a11081a6c13bb9c32d9caa448479fd5f0302b6729ca7233094540b14546d6bcc15771c2686279b34f9c0914f5306d0fabd5979266ea01a17a22507e560dbf904dd62c40e2bccb468710ee4c1caf4e786", 0xcfa}], 0x1}, 0x0) 12:36:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, &(0x7f0000000100)) 12:36:06 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000400)="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") r1 = syz_open_procfs(0x0, &(0x7f0000000200)="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") sendfile(r0, r1, 0x0, 0x1) fstatfs(r0, &(0x7f0000000040)=""/175) 12:36:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, 0x0) 12:36:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x2, [{}, {}]}, 0x48) 12:36:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, 0x0) 12:36:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:07 executing program 4: close(0xffffffffffffffff) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040), 0x20000275}]) 12:36:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f00007a7000)='./control\x00', 0xa4000960) inotify_rm_watch(r0, r1) 12:36:07 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:07 executing program 5: socketpair$unix(0x1, 0x20000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x6, &(0x7f0000000040)=0x0) io_submit(r4, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r4, 0x4, 0x888, &(0x7f0000000100)=[{}, {}], &(0x7f00005cfff0)={0x4000000000001, 0x7}) io_destroy(r4) 12:36:07 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x20, &(0x7f0000000940)=""/100, 0x0) 12:36:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:07 executing program 0: [ 754.801367] audit: type=1326 audit(1544618167.387:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28878 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:36:07 executing program 5: 12:36:07 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:07 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:07 executing program 5: 12:36:07 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:08 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:08 executing program 0: 12:36:08 executing program 5: 12:36:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) [ 755.591375] audit: type=1326 audit(1544618168.180:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=28878 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:36:08 executing program 2: 12:36:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040), 0x20000275}]) 12:36:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000180)={'ip6_vti0\x00', {0x2, 0x0, @empty}}) 12:36:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev_snmp6\x00') fstat(r0, &(0x7f0000000200)) 12:36:08 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:08 executing program 2: r0 = memfd_create(&(0x7f0000000040)='em0\x00', 0x0) pwritev(r0, &(0x7f0000002540)=[{&(0x7f0000000380)='\n', 0x1}], 0x1, 0x0) 12:36:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(0xffffffffffffffff) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000100)) 12:36:08 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x1000000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) 12:36:08 executing program 2: futex(&(0x7f0000000000), 0x1, 0x0, 0x0, 0x0, 0x0) 12:36:08 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='bpf\x00', 0x0, 0x0) rmdir(&(0x7f0000000380)='./file0\x00') 12:36:08 executing program 2: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) rename(0x0, 0x0) r2 = dup(0xffffffffffffffff) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) openat$cgroup_ro(r2, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r3, 0x80103) sendfile(r1, r3, &(0x7f0000000080), 0x8000fffffffe) 12:36:08 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:08 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:08 executing program 3: close(0xffffffffffffffff) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x89e2, 0x70f000) 12:36:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x1000000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) [ 756.364764] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:36:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x0, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:09 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:09 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x1000000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) 12:36:09 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:09 executing program 2: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000000380)="f786bc7dfb1c39ac29b2d04f8fcdcab741801eb5bf50216bcd865d2140206727d3b370015a2e710efc69181c529104103b33cb0e5d46ee2b6b359dc67d0b1cc89245b0a8fe690b72ff333bb821fe2687e725733bcff74ccd2e7d36bb66ab045cd45191f595698d744ec1a5d94bee472c16b653e23f81d79812a3aad5267cd7967d890ba8c4010ea506d2ce40e2ae31cf263c6b05f8c897785fd67f3d3733556a12837811654ce35eef3d49445dc5818d6624dacec61b8c3f842a19b9833f053147a6ed1e2e15450c734d4c3b684a6742474467c0b449a2254ea5eaac1e9275dd99ab085b3af602eaff54080dc1f8354d9af9", 0xf2) 12:36:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='attr/fscreate\x00') preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/111, 0x6f}], 0x1, 0x0) 12:36:09 executing program 1: wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x24, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0x0}, 0x48) 12:36:09 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:09 executing program 2: pipe(&(0x7f00000000c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r2, &(0x7f00000017c0), 0x10000000000001f7, 0x1000000) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000100)) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f00000000c0)=0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000380)) 12:36:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') readv(r0, &(0x7f0000002180)=[{&(0x7f0000001100)=""/4096}, {&(0x7f0000002100)=""/94}, {&(0x7f0000002380)=""/4096, 0x37d}], 0x87908de) 12:36:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x0, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:09 executing program 1: wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:09 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) 12:36:09 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x899b, 0x0) readv(r0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/4096, 0xffffff5c}], 0x100000000000010f) readv(r0, &(0x7f0000000580), 0x3c1) 12:36:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:10 executing program 1: wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:10 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x899b, 0x0) readv(r0, &(0x7f0000002340)=[{&(0x7f0000000080)=""/4096, 0xffffff5c}], 0x100000000000010f) readv(r0, &(0x7f0000000580), 0x3c1) 12:36:10 executing program 2: pipe(&(0x7f00000000c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') preadv(r2, &(0x7f00000017c0), 0x10000000000001f7, 0x1000000) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000100)) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f00000000c0)=0x3) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00004e8000), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000380)) 12:36:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x0, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:10 executing program 0: request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 12:36:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) 12:36:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='net/tcp\x00') ioctl$sock_ifreq(r0, 0x1, 0x0) 12:36:10 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a02000000ff81004e227e00000058000b4824ca944f640094000500", 0x2c}], 0x1) 12:36:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 12:36:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002800)=""/173, 0xad}], 0x1}, 0x0) sendto$inet(r0, &(0x7f0000000000)="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", 0x103, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/226, 0xe2}], 0x1) 12:36:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000600)="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") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) fchown(r0, 0x0, r2) 12:36:10 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x0, 0x0) 12:36:10 executing program 0: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) 12:36:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:10 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:10 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/net\x00') syz_open_procfs$namespace(0x0, &(0x7f0000005980)='ns/mnt\x00') 12:36:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x0, 0x0) 12:36:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:11 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:11 executing program 2: set_mempolicy(0x40000000002, &(0x7f0000000180)=0x401, 0x7) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) 12:36:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x0, 0x0) 12:36:11 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) rmdir(&(0x7f00000000c0)='./control\x00') 12:36:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x0, &(0x7f0000000080)) 12:36:11 executing program 0: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:11 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:11 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) [ 759.039011] audit: type=1326 audit(1544618171.602:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29207 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:36:11 executing program 0: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:11 executing program 0: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x0, &(0x7f0000000080)) 12:36:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:11 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) [ 759.829797] audit: type=1326 audit(1544618172.375:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29207 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a4da code=0xffff0000 12:36:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:12 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:12 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:12 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xaf9232572864daca) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getgid() getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000006, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x1000001000080, 0x0) sendmsg$nl_route(r0, 0x0, 0x10) bind$unix(0xffffffffffffffff, 0x0, 0x0) listen(r3, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) close(r3) socket$inet6(0xa, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendto$packet(r2, &(0x7f00000000c0)="52b00c69905d7984b9fe3c5e9c603670ebfa8987edfe9c9322296cc52beba13c0700000073e02ea83fe04e8a4766270d641b64f3d7", 0x35, 0x4000001, 0x0, 0x0) 12:36:14 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x0, &(0x7f0000000080)) 12:36:14 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @rand_addr=0x9}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x61) read(r0, &(0x7f0000000000)=""/11, 0x7103) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000001c0)) 12:36:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) 12:36:14 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[0x0]) 12:36:14 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:14 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 12:36:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) 12:36:14 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:14 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0xc0000002, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) 12:36:15 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040), 0x20000275}]) 12:36:15 executing program 2: 12:36:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:15 executing program 2: 12:36:15 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:15 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 12:36:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:15 executing program 2: 12:36:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000100)={{}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast2}, 'teql0\x00'}) 12:36:15 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:15 executing program 2: 12:36:15 executing program 0: 12:36:15 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:15 executing program 2: 12:36:16 executing program 0: 12:36:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 12:36:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:16 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r0 = getpid() pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000040), 0xfffffd84) ptrace(0x4206, r0) tkill(r0, 0x9) 12:36:16 executing program 2: 12:36:16 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:16 executing program 0: 12:36:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:36:16 executing program 2: 12:36:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) socket(0x200000000000011, 0x803, 0x0) io_setup(0x7, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 12:36:16 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x89e2, 0x70f000) 12:36:16 executing program 0: [ 764.105760] IPVS: ftp: loaded support on port[0] = 21 [ 765.756620] device bridge_slave_1 left promiscuous mode [ 765.762177] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.806015] device bridge_slave_0 left promiscuous mode [ 765.811548] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.792637] list_add corruption. prev->next should be next (ffffffff8a1dca60), but was ffff8881c3521d70. (prev=ffff8881bf8f0270). [ 766.805167] ------------[ cut here ]------------ [ 766.809929] kernel BUG at lib/list_debug.c:28! [ 766.814575] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 766.819941] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.20.0-rc6-next-20181210+ #164 [ 766.827826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.837200] RIP: 0010:__list_add_valid.cold.2+0x23/0x2a [ 766.842564] Code: e8 00 1f d2 fd 0f 0b 48 89 d9 48 c7 c7 20 e6 80 88 e8 ef 1e d2 fd 0f 0b 48 89 f1 48 c7 c7 a0 e6 80 88 48 89 de e8 db 1e d2 fd <0f> 0b 90 90 90 90 90 55 48 89 e5 41 57 41 56 49 be 00 00 00 00 00 [ 766.861467] RSP: 0018:ffff8881dad06ce0 EFLAGS: 00010286 [ 766.866831] RAX: 0000000000000075 RBX: ffffffff8a1dca60 RCX: 0000000000000000 [ 766.874105] RDX: 0000000000000000 RSI: ffffffff816621c5 RDI: 0000000000000005 [ 766.881374] RBP: ffff8881dad06cf8 R08: ffff8881d9b14340 R09: ffffed103b5a5020 [ 766.888640] R10: ffffed103b5a5020 R11: ffff8881dad28107 R12: ffff8881d29ffdb0 [ 766.895908] R13: ffff8881d29ffb40 R14: ffffffff8a1dc820 R15: ffffffff8a1dcab0 [ 766.903212] FS: 0000000000000000(0000) GS:ffff8881dad00000(0000) knlGS:0000000000000000 [ 766.911438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 766.917318] CR2: 0000000000417a60 CR3: 00000001c1550000 CR4: 00000000001426e0 [ 766.924615] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 766.931883] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 766.939146] Call Trace: [ 766.941722] [ 766.943963] ___neigh_create+0x14b7/0x2600 [ 766.948222] ? mark_held_locks+0x130/0x130 [ 766.952485] ? print_usage_bug+0xc0/0xc0 [ 766.956545] ? find_held_lock+0x36/0x1c0 [ 766.960625] ? print_usage_bug+0xc0/0xc0 [ 766.964693] ? neigh_remove_one+0x5a0/0x5a0 [ 766.969021] ? print_usage_bug+0xc0/0xc0 [ 766.973082] ? __local_bh_enable_ip+0x160/0x260 [ 766.977751] ? __local_bh_enable_ip+0x160/0x260 [ 766.982422] ? lockdep_hardirqs_on+0x296/0x5b0 [ 766.987011] ? mark_held_locks+0x130/0x130 [ 766.991288] ? __local_bh_enable_ip+0x160/0x260 [ 766.995965] ? lockdep_hardirqs_on+0x296/0x5b0 [ 767.000556] ? trace_hardirqs_on+0xbd/0x310 [ 767.004894] ? mark_held_locks+0xc7/0x130 [ 767.009102] ? ip6t_do_table+0xd9e/0x1d30 [ 767.013260] ? trace_hardirqs_off_caller+0x310/0x310 [ 767.018366] ? __local_bh_enable_ip+0x160/0x260 [ 767.023040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.028582] ? lock_acquire+0x1ed/0x520 [ 767.032561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.038103] ? check_preemption_disabled+0x48/0x280 [ 767.043147] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 767.048684] ? rcu_pm_notify+0xc0/0xc0 [ 767.052579] __neigh_create+0x30/0x40 [ 767.056455] ip6_finish_output2+0xa64/0x2940 [ 767.060892] ? find_held_lock+0x36/0x1c0 [ 767.064952] ? ip6_forward_finish+0x560/0x560 [ 767.069505] ? ip6_mtu+0x39c/0x520 [ 767.073053] ? lock_downgrade+0x900/0x900 [ 767.077203] ? check_preemption_disabled+0x48/0x280 [ 767.082231] ? kasan_check_read+0x11/0x20 [ 767.086383] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 767.091660] ? rcu_read_unlock_special+0x370/0x370 [ 767.096614] ? ip6_mtu+0x160/0x520 [ 767.100153] ? find_match+0x10a0/0x10a0 [ 767.104126] ? kasan_check_read+0x11/0x20 [ 767.108272] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 767.113549] ip6_finish_output+0x58c/0xc60 [ 767.117796] ? ip6_finish_output+0x58c/0xc60 [ 767.122240] ip6_output+0x232/0x9d0 [ 767.125871] ? ip6_finish_output+0xc60/0xc60 [ 767.130280] ? ip6_fragment+0x38b0/0x38b0 [ 767.134431] ? __lock_is_held+0xb5/0x140 [ 767.138502] ndisc_send_skb+0x1005/0x1560 [ 767.142659] ? nf_hook.constprop.33+0x860/0x860 [ 767.147340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.152885] ? refcount_sub_and_test_checked+0x203/0x310 [ 767.158344] ? refcount_dec_if_one+0x180/0x180 [ 767.162941] ? memcpy+0x45/0x50 [ 767.166236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.171778] ndisc_send_rs+0x134/0x6e0 [ 767.175671] addrconf_rs_timer+0x314/0x690 [ 767.179911] ? ipv6_get_lladdr+0x5e0/0x5e0 [ 767.184175] call_timer_fn+0x272/0x920 [ 767.188065] ? ipv6_get_lladdr+0x5e0/0x5e0 [ 767.192301] ? process_timeout+0x40/0x40 [ 767.196372] ? __run_timers+0x7da/0xc70 [ 767.200353] ? _raw_spin_unlock_irq+0x27/0x80 [ 767.204877] ? _raw_spin_unlock_irq+0x27/0x80 [ 767.209387] ? ipv6_get_lladdr+0x5e0/0x5e0 [ 767.213632] ? lockdep_hardirqs_on+0x296/0x5b0 [ 767.218218] ? trace_hardirqs_on+0xbd/0x310 [ 767.222541] ? kasan_check_read+0x11/0x20 [ 767.226716] ? __run_timers+0x7da/0xc70 [ 767.230694] ? trace_hardirqs_off_caller+0x310/0x310 [ 767.235805] ? ipv6_get_lladdr+0x5e0/0x5e0 [ 767.240043] __run_timers+0x7e5/0xc70 [ 767.243852] ? timer_fixup_init+0x70/0x70 [ 767.248016] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 767.253036] ? graph_lock+0x270/0x270 [ 767.256845] ? enqueue_hrtimer+0x1a5/0x560 [ 767.261083] ? hrtimer_update_softirq_timer+0xa0/0xa0 [ 767.266276] ? find_held_lock+0x36/0x1c0 [ 767.270354] ? pvclock_read_flags+0x160/0x160 [ 767.274860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.280400] ? check_preemption_disabled+0x48/0x280 [ 767.285420] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 767.290961] ? rcu_pm_notify+0xc0/0xc0 [ 767.294866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.300406] ? check_preemption_disabled+0x48/0x280 [ 767.305424] run_timer_softirq+0x52/0xb0 [ 767.309492] ? rcu_read_lock_sched_held+0x14f/0x180 [ 767.314519] __do_softirq+0x308/0xb7e [ 767.318330] ? ktime_get_raw_ts64+0x4d0/0x4d0 [ 767.322883] ? lock_downgrade+0x900/0x900 [ 767.327037] ? __irqentry_text_end+0x1f9658/0x1f9658 [ 767.332144] ? pvclock_read_flags+0x160/0x160 [ 767.336742] ? lapic_next_event+0x5a/0x90 [ 767.340903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.346456] ? kvm_clock_read+0x18/0x30 [ 767.350455] ? kvm_sched_clock_read+0x9/0x20 [ 767.354868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.360412] ? check_preemption_disabled+0x48/0x280 [ 767.365439] irq_exit+0x17f/0x1c0 [ 767.368898] smp_apic_timer_interrupt+0x1cb/0x760 [ 767.373738] ? smp_reschedule_interrupt+0x109/0x650 [ 767.378765] ? smp_call_function_single_interrupt+0x650/0x650 [ 767.384650] ? interrupt_entry+0xb5/0xc0 [ 767.388718] ? trace_hardirqs_off_caller+0xbb/0x310 [ 767.393743] ? trace_hardirqs_off_caller+0xbb/0x310 [ 767.398762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 767.403615] ? trace_hardirqs_on_caller+0x310/0x310 [ 767.408636] ? trace_hardirqs_on_caller+0x310/0x310 [ 767.413657] ? task_prio+0x50/0x50 [ 767.417204] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 767.422742] ? check_preemption_disabled+0x48/0x280 [ 767.428296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 767.433156] apic_timer_interrupt+0xf/0x20 [ 767.437384] [ 767.439627] RIP: 0010:native_safe_halt+0x6/0x10 [ 767.444295] Code: e9 2c ff ff ff 48 89 c7 48 89 45 d8 e8 43 e8 e0 f9 48 8b 45 d8 e9 ca fe ff ff 48 89 df e8 32 e8 e0 f9 eb 82 55 48 89 e5 fb f4 <5d> c3 0f 1f 84 00 00 00 00 00 55 48 89 e5 f4 5d c3 90 90 90 90 90 [ 767.463206] RSP: 0018:ffff8881d9b2fcb8 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 767.470910] RAX: dffffc0000000000 RBX: 1ffff1103b365f9b RCX: 0000000000000000 [ 767.478209] RDX: 1ffffffff12e4819 RSI: 0000000000000001 RDI: ffffffff897240c8 [ 767.485473] RBP: ffff8881d9b2fcb8 R08: ffff8881d9b14340 R09: 0000000000000000 [ 767.492743] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881d9b2fd78 [ 767.500020] R13: ffffffff8a3739a0 R14: 0000000000000000 R15: 0000000000000001 [ 767.507350] default_idle+0xbf/0x490 [ 767.511070] ? rcu_dynticks_eqs_enter+0x4f/0x80 [ 767.515765] ? __sched_text_end+0x1/0x1 [ 767.519749] ? rcu_idle_enter+0x39a/0x530 [ 767.523896] ? rcu_eqs_special_set+0x1c0/0x1c0 [ 767.528484] ? tsc_verify_tsc_adjust+0x137/0x450 [ 767.533254] ? trace_hardirqs_off_caller+0x310/0x310 [ 767.538363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.543932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.549560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.555096] arch_cpu_idle+0x10/0x20 [ 767.558863] default_idle_call+0x6d/0x90 [ 767.562963] do_idle+0x49b/0x5c0 [ 767.566351] ? arch_cpu_idle_exit+0x70/0x70 [ 767.570686] ? do_idle+0x17/0x5c0 [ 767.574144] cpu_startup_entry+0x18/0x20 [ 767.578210] start_secondary+0x487/0x5f0 [ 767.582277] ? set_cpu_sibling_map+0x1890/0x1890 [ 767.587042] secondary_startup_64+0xa4/0xb0 [ 767.591375] Modules linked in: [ 767.594619] ---[ end trace cd09fac46552218a ]--- [ 767.599409] RIP: 0010:__list_add_valid.cold.2+0x23/0x2a [ 767.604778] Code: e8 00 1f d2 fd 0f 0b 48 89 d9 48 c7 c7 20 e6 80 88 e8 ef 1e d2 fd 0f 0b 48 89 f1 48 c7 c7 a0 e6 80 88 48 89 de e8 db 1e d2 fd <0f> 0b 90 90 90 90 90 55 48 89 e5 41 57 41 56 49 be 00 00 00 00 00 [ 767.623723] RSP: 0018:ffff8881dad06ce0 EFLAGS: 00010286 [ 767.629109] RAX: 0000000000000075 RBX: ffffffff8a1dca60 RCX: 0000000000000000 [ 767.636438] RDX: 0000000000000000 RSI: ffffffff816621c5 RDI: 0000000000000005 [ 767.643740] RBP: ffff8881dad06cf8 R08: ffff8881d9b14340 R09: ffffed103b5a5020 [ 767.651024] R10: ffffed103b5a5020 R11: ffff8881dad28107 R12: ffff8881d29ffdb0 [ 767.658293] R13: ffff8881d29ffb40 R14: ffffffff8a1dc820 R15: ffffffff8a1dcab0 [ 767.665573] FS: 0000000000000000(0000) GS:ffff8881dad00000(0000) knlGS:0000000000000000 [ 767.673815] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 767.679687] CR2: 0000000000417a60 CR3: 00000001c1550000 CR4: 00000000001426e0 [ 767.686998] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 767.694293] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 767.701653] Kernel panic - not syncing: Fatal exception in interrupt [ 767.709198] Kernel Offset: disabled [ 767.712820] Rebooting in 86400 seconds..